Issue Sponsored By:
> Bytware
![]()
IN THIS ISSUE:
>
Tracking critical file access in real time
>
Tracking use of critical files/objects
>
Learning guide: Simple steps to a secure iSeries
>
Get better control over user profiles
>
Top 10 security tips
>
Tip contest -- Win a Skagen slimline watch
>
Free Book Excerpt: Backup & Recovery chapter
![Headlines]()
![]()
Tracking critical file access in real time
[Search400.com]
by Rich Loeber
If you're a regular reader, you'll know that last time around, I
presented a method where you can use OS/400 object auditing to keep track of who is doing what with selected files and objects. That's a good way to keep a record of what's happening with these critical resources on your system, but no matter how often you check results, it is always after the fact. This week, I'll give you a way to track and report on file access for read, change and/or delete with immediate, real-time notification.
MORE INFO:
> View previous tips by Rich Loeber
> View our entire collection of security tips
| |
![]() |
![AD]() |
![]() |
Bytware
Deleted Files. It's happened to us all, either deleted by accident, by a virus, or by a disgruntled employee. Wouldn't it be nice if these files could be restored as easily as they were deleted, without having to turn to time-consuming and costly backups? Now they can. With StandGuard Recycle Bin, the new Windows-style file protection utility designed specifically for the iSeries, you can bring back lost files from all of your mapped drives with just a few clicks of your mouse.
For details and a free trial, click here.
|
| |
Tracking use of critical files/objects
[Search400.com]
Most shops have mission-critical information assets stored on their iSeries system. If you're doing your job as a security officer, those assets are locked up tight to make sure only authorized user profiles can get to them. But do you know who is actually accessing that critical data?
Learning guide: Simple steps to a secure iSeries
[Search400.com]
If
you're a systems manager, chances are security is your top priority. With new security issues emerging on a daily basis, it can seem like you're swimming against the tide when trying to secure your system from both intentional and unintentional security breaches and threats. We've gathered some good security information in this security Learning Guide to help you along your way. Consider it a security life preserver of sorts.
Get better control over user profiles
[Search400.com]
Every iSeries shop has the potential to have active user profiles on the system for users who have left the company. Unless your personnel department is extra careful about global notifications when people leave, you may have a security exposure that you don't even know about. But you can, if you're careful about setting up user profiles, take care of this problem when new profiles are created.
Top 10 security tips
[Search400.com]
There's no such thing as being too secure. Even if you run an iSeries, there are still a few things you must do to protect your system and your data. These tips can help you out.
![Also on Search400.com]()
![]()
TIME'S RUNNING OUT!:
Tip contest -- Win a Skagen slimline watch
This month's winner will receive a Skagen Slimline watch. This watch has a sophisticated large black face with chrome arrow markers. It's a chrome-plated, 100% stainless steel case with luxurious black calfskin leather band. It also features scratch-resistant mineral crystal and Japanese quartz movement. So don't waste time, send in your tip today!
Don't forget to go in and rate our recent tips:
Create an iSeries Access image and update it with the latest Service Pack
Mixing free format code with embedded SQL
SQL update a field in one file from a field in another file
Take a close look at what commands a user profile is using
Easy code copying via the drag and drop method
A MUST READ:
Free Book Excerpt: Backup & Recovery chapter
Log on and download for free Chapter 6 of AS/400 Primer written by Ernie Malaga, Doug Pence and Ron Hawkins and published by MC Press. This chapter, "Backup and Recovery," focuses on the essential backup and recovery commands.
Win a copy of the book: After you read the chapter, test how much you learned and then send us the results for a chance to win a copy of AS/400 Primer. Send your e-mail to mailto:[EMAIL PROTECTED].
SURVEY:
Is there any hope for PeopleSoft?
1. A majority of PeopleSoft stockholders have tendered their shares to Oracle. Is there any hope left for PeopleSoft?
2. Are you a PeopleSoft/JD Edwards customer?
>> Vote now
| |
![]() |
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]
Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
|
![]() |
| |
|
![]() |
| |
![]() |
Free E-Newsletters! Select e-newsletters you would like to receive via e-mail!
Search400: Today's News
Search400: Administrator Tips
Search400: Programmer Tips
![]()
![]()
Not a Member? We'll activate your membership with your subscription.
|
![]() |
| |
|
|
![]()
![]() |
![TechTarget - The Most Targeted IT Media]() |
![]() |
This e-newsletter is published by Search400.com, a targeted Web site from TechTarget, the most targeted IT media and events company.
To unsubscribe from "Security Tip":
Go to unsubscribe: http://search400.techtarget.com/unsubscribe?cid=497974&lid=460581&track=NL-236&ad=497974
Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.
Contact Us: Search400 Member Services 117 Kendrick Street, Suite 800 Needham, MA 02494
|
![]() |
|
![]() |
|