Title: Administrator Tips
  August 04, 2004 Published by  Search400.com   

Administrator Tips

search400.com
News Topics Ask the Experts Tips Webcasts White Papers
IN THIS ISSUE:
  >  The registration facility helps you tailor your system -- Part I
  >  A primer to writing TCP/IP exit point programs
  >  Can you trust all those trigger programs?
  >  What exactly are exit programs?
  >  FTP security using exit program
  >  Fast guide to common iSeries error messages
SPONSORED BY:  Search400.com Product and Vendor Guide

The Buyers guide is one of the most comprehensive directories of vendor and product information on the Web. It covers a wide range of areas for your research needs, including Application Dev, E-Commerce Solutions, Security and more. Simply search by topic, company name or keyword and you have access to complete vendor and important product information without having to comb through multiple sites.

Click Here!

Headlines


The registration facility helps you tailor your system -- Part I
[Search400.com]
by Ron Turull

Exit programs allow you to customize software when the vendor has defined exit points for it. They are a great way to customize security and general function of certain applications. The registration facility built into OS/400 brings another level of "openness" to the iSeries. It is a central place -- with standard interfaces -- in which IBM and other vendors can store exit points, and where users can specify exit programs for those exit points.

This week we take a look at exit programs and points and how you can use the registration facility to define and manage them.

MORE INFO:
View other tips by Ron Turull

A primer to writing TCP/IP exit point programs
[Search400.com]
Security guru Dan Riehl explains what TCP/IP exit points are and how to use a TCP/IP exit point program to create a log that records each time a user tries to log in to your FTP server.

Can you trust all those trigger programs?
[Search400.com]
You may think that because you're working on the iSeries that you're safe from rampant computer viruses, worms and other malicious programs moving their way around the Internet, but think again. A malicious program can still get written and installed on your system, hidden away waiting for the right event to come out and strike. How, you ask? As a trigger program.

What exactly are exit programs?
[Search400.com]
One user writes, "I've heard a lot about exit programs lately. Can you give me an overview of what they are and how they work? I need to write a couple. Also, where can I find some examples? I need to write one for the QIBM_QCA_RTV_COMMAND." Site expert John Brandt responds.

FTP security using exit program
[Search400.com]
Search400.com security expert Carol Woodbury discussed FTP security when using exit programs. Carol also points out where good examples of how to write an exit program can be found.

Also on Search400.com

FAST GUIDE::  Fast guide to common iSeries error messages
Puzzled by an iSeries error message? There's almost nothing more frustrating than being in the middle of a download process and receiving an error message that you have no idea what it means or why you've received it. We've compiled a list of resources for iSeries error messages that you can browse through quickly to find a possible solution to your error.

MANAGING THE ISERIES FORUM:  Interact with other administrators
Are you an iSeries administrator with questions? Join your peers in our Managing the iSeries Forum to ask and answer questions on systems management issues. Search400.com experts frequent the forums and share their expertise.

BEST WEB LINKS:  Systems management -- performance
Are you looking for some information or advice on how to get the best possible performance out of your iSeries? We have scoured the Web and gathered some of the best links out there on performance issues. Check out these tips to see how you can keep your iSeries running smoothly.


 
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]

Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
 
 
Free E-Newsletters!
Select e-newsletters you would like to receive via e-mail!

 Search400: Programmer Tips
 Search400: Security Tip
 Search400: Today's News




Not a Member? We?ll activate your membership with your subscription.
 




TechTarget - The Most Targeted IT Media This e-newsletter is published by Search400.com, a targeted Web site from TechTarget, the most targeted IT media and events company.

To unsubscribe from "Administrator Tips":
Go to unsubscribe: http://search400.techtarget.com/unsubscribe?track=NL-176&ad=488440

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Contact Us:
Search400
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to