Issue Sponsored By:
> Bytware
![]()
IN THIS ISSUE:
>
Your built-in security consultant -- Free of charge
>
Standardized security setup across multiple systems
>
Securing users within OpsNav
>
Learning Guide: Simple steps to a secure iSeries
>
Top advice on securing your iSeries
>
Tip contest: Win a Skagen slimline watch
>
User poll: Vote now
![Headlines]()
![]()
Your built-in security consultant -- Free of charge
[Search400.com]
Rich Loeber
If you're looking around for a security consultant who won't cost you too much, you might just already have one at your disposal hidden away in Operations Navigator (or iSeries Navigator, depending on your version of OS). It comes in the form of a Security Wizard, and the amount of analysis and information provided is pretty good, especially at the price.
MORE INFO:
> View previous tips by Rich Loeber
| |
![]() |
![AD]() |
![]() |
Bytware
Deleted Files. It's happened to us all, either deleted by accident, by a virus, or by a disgruntled employee. Wouldn't it be nice if these files could be restored as easily as they were deleted, without having to turn to time-consuming and costly backups? Now they can. With StandGuard Recycle Bin, the new Windows-style file protection utility designed specifically for the iSeries, you can bring back lost files from all of your mapped drives with just a few clicks of your mouse.
For details and a free trial, visit us at COMMON booth 305 and online.
|
| |
Standardized security setup across multiple systems
[Search400.com]
Nothing supports the popularity of the iSeries as much as the number
of customers with multiple systems installed. For security officers,
it can easily mean a lot of extra work keeping each system configured
and setup for company security policies. While this can be a complex task, IBM has provided a little-known capability in OS/400 for quite a while now that can help you to
enforce standard security configuration setup rules across separate
systems.
Securing users within OpsNav
[Search400.com]
One Search400.com member asks, "How do I secure users with what access they have within Operations Navigator?" Security expert Carol Woodbury talks about the options and how it may be best to use a combination of three of these options.
Learning Guide: Simple steps to a secure iSeries
[Search400.com]
If you're a systems manager, chances are security is your top priority. With new security issues emerging on a daily basis, it can seem like you're swimming against the tide when trying to secure your system from both intentional and unintentional security breaches and threats. We've gathered some good security information in this security
Learning Guide to help you along your way. Consider it a security life preserver of sorts.
Top advice on securing your iSeries
[Search400.com]
Security expert Carol Woodbury answers questions on granting special authority, changing user authority, Sarbanes-Oxley regulations and more in these top expert Q&As.
![]()
SEARCH400.COM PRODUCT OF THE YEAR AWARDS:
Accepting nominations now
Have a great product or tool? In January, Search400.com will present its Second Annual Product of the Year awards. The awards will highlight and celebrate those entries in the market that are deemed outstanding examples of new and innovative technological advancement for users.
Submit an application to have your product considered. But act fast: The deadline to submit nominations is Monday, Oct. 25.
SUBMIT A TIP TODAY:
Tip contest: Win a Skagen slimline watch
This month winner will receive a Skagen Slimline watch. This watch has a sophisticated large black face with chrome arrow markers. It's a chrome-plated, 100% stainless steel case with luxurious black calfskin leather band. It also features scratch-resistant mineral crystal and Japanese quartz movement. So don't waste time, send in your tip today!
Don't forget to go in and rate our recent tips:
Easy code copying ... without CODE400
Generic trigger program to capture create/change date and time
Using files with multiple members in SQL or ODBC
Quick view contents of a data file
Find duplicate records in a file
USER SURVEY:
User poll: Vote now
How loyal are you to your employer?
| |
![]() |
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]
Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
|
![]() |
| |
|
![]() |
| |
![]() |
Free E-Newsletters! Select e-newsletters you would like to receive via e-mail!
Search400: Today's News
Search400: Administrator Tips
Search400: Programmer Tips
![]()
![]()
Not a Member? We?ll activate your membership with your subscription.
|
![]() |
| |
|
|
![]()
![]() |
![TechTarget - The Most Targeted IT Media]() |
![]() |
This e-newsletter is published by Search400.com, a targeted Web site from TechTarget, the most targeted IT media and events company.
To unsubscribe from "Security Tip":
Go to unsubscribe: http://search400.techtarget.com/unsubscribe?cid=494166&lid=460581&track=NL-236&ad=494166
Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.
Contact Us: Search400 Member Services 117 Kendrick Street, Suite 800 Needham, MA 02494
|
![]() |
|
![]() |
|