Title: Administrator Tips
  October 14, 2004 Published by  Search400.com   

Administrator Tips

search400.com
News Topics ITKnowledge Exchange Tips Ask the Experts Webcasts White Papers
Issue Sponsored By:
  > Help/Systems, Inc.
  > DDL Systems -- your iSeries Systems Management Specialists


IN THIS ISSUE:
  >  Use caution when providing access to file shares
  >  Things about *ALLOBJ special authority to be aware of
  >  Getting control over adopted authorities
  >  Why isn't the user authorized?
  >  Learning Guide: Simple steps to a secure iSeries
  >  User poll: Vote now
  >  ITKnowledge Exchange: Get answers to your questions fast

Headlines


Use caution when providing access to file shares
[Search400.com]
By Carol Woodbury

Although file shares are a convenient way to share data throughout a corporation, defining shares can create serious security exposures if OS/400 object authority hasn't been utilized. Follow these steps to make sure the correct people have permission to create and change file shares.

MORE INFO:
Get more advice from Carol Woodbury


 
AD WHAT DO YOU NEED TO KNOW FOR YOUR V5R3 UPGRADE?
New online classes address planning your upgrade and the upgrade process. Learn the planning, preparation, installation, and post-installation steps to be successful. Live Internet-based classes on 10/19 & 21. Offered again, 12/8 & 15. Click here for more info.
 

Things about *ALLOBJ special authority to be aware of
[Search400.com]
One user had discovered many quirks for profiles with *ALLOBJ special authority. He turned to security expert Carol Woodbury for an explanation.

Getting control over adopted authorities
[Search400.com]
For security reasons, OS/400 programs have a setting that, when compiled, controls the user profile that will be used when that program runs. You may think your security configuration is all set and that you've made a final determination as to which users are allowed to access what objects on your system, but if a program on your system is compiled with the USRPRF attribute set to *OWNER, then all your preparation work may be out the window.

Why isn't the user authorized?
[Search400.com]
Why would a user not be authorized to use a file residing in a library that is in their library list and to which one of their user profile's supplemental groups is authorized? Security expert Carol Woodbury explains.

Learning Guide: Simple steps to a secure iSeries
[Search400.com]
If you're a systems manager, chances are security is your top priority. With new security issues emerging on a daily basis, it can seem like you're swimming against the tide when trying to secure your system from both intentional and unintentional security breaches and threats. We've gathered some good security information in this security Learning Guide to help you along your way. Consider it a security life preserver of sorts.

Also on Search400.com

SEARCH400.COM PRODUCTS OF THE YEAR AWARDS:  Accepting nominations now
Have a great product or tool? In January, Search400.com will present its Second Annual Product of the Year awards. The awards will highlight and celebrate those entries in the market that are deemed outstanding examples of new and innovative technological advancement for users.

Submit an application to have your product considered. But act fast: The deadline to submit nominations is Monday, Oct. 25.

 
AD Aren't you tired of worrying about your iSeries?
ACO PAGER -- proactively monitors your iSeries (or AS/400) 24/7, immediately notifying you of system events and responding to complex problems before they become critical. Remotely manage your system using a web browser, any 2-way capable device, e-mail, or SNMP client, ensuring problem resolution through robust message escalation features. More than a paging system -- ACO PAGER is a complete systems management solution. Click here.
 


USER SURVEY:  User poll: Vote now
How loyal are you to your employer?

GOT QUESTIONS?:  ITKnowledge Exchange: Get answers to your questions fast
Now you can ask any one of your fellow TechTarget members -- 1.2 million strong -- specific questions on technology, best practices or other IT issues. Just tell us who you are and the subjects you're interested in (iSeries, RPG, DB2, WebSphere, etc.) and then ask your questions or offer advice to other IT professionals. Our ITKnowledge Exchange brings members from all 22 TechTarget Web sites together to share information and experiences.


 
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]

Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
 
 
Free E-Newsletters!
Select e-newsletters you would like to receive via e-mail!

 Search400: Programmer Tips
 Search400: Security Tip
 Search400: Top Expert Advice




Not a Member? We?ll activate your membership with your subscription.
 




TechTarget - The Most Targeted IT Media This e-newsletter is published by Search400.com, a targeted Web site from TechTarget, the most targeted IT media and events company.

To unsubscribe from "Administrator Tips":
Go to unsubscribe: http://search400.techtarget.com/unsubscribe?cid=494170&lid=430676&track=NL-176&ad=494170

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Contact Us:
Search400
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to