Issue Sponsored By:
>
Data Center Decisions
IN THIS ISSUE:
>
Restrict *PUBLIC access to critical OS components
>
Time to review your *PUBLIC authority setups
>
The danger of indiscriminately assigning special authorities
>
Preventing users from uploading data
>
Top 10 security tips of 2004
>
Enter to win a Garmin eMap
>
User poll: iSeries revenue decline
![Headlines]()
![]()
Restrict *PUBLIC access to critical OS components
[Search400.com]
As a security officer, you are responsible for keeping a tight rein on your system. To add just another level of confidence, take a look at running the Revoke Public Authority (RVKPUBAUT) command on your system to restrict the use of certain critical OS/400 commands and API objects.
MORE INFO:
> View previous tips by Rich Loeber
| |
![]() |
| |
![]() |
Attend Data Center Decisions 2005
Join us in New York for Data Center Decisions 2005. Learn about the latest technologies for the data center, get top advice from industry experts & win a new Mercedes SLK.
Register today.
|
| |
|
| |
Time to review your *PUBLIC authority setups
[Search400.com]
OS/400's robust security architecture lets you specify security
authorization at a variety of levels -- from the individual profile
level to the group profile level and even supplemental group profile
level. If, however, your system has default setups for *PUBLIC
authority that are too broad in nature, all the little details at the
other levels could easily be frustrated. It is important to
understand how your *PUBLIC authorities are set and to review them
periodically.
The danger of indiscriminately assigning special authorities
[Search400.com]
In this tip, security guru Dan Riehl explains the special
authorities and points out the main exposures if they are not
assigned judiciously.
Preventing users from uploading data
[Search400.com]
One user writes, "I'm in the process of implementing ODBC on my
iSeries. How can I prevent users from uploading data back to the
iSeries? I have no problem with my users downloading data; I don't
want them uploading data. Also, can security be placed at the library
level?" Security expert Carol Woodbury offers some advice.
Top 10 security tips of 2004
[Search400.com]
Last year top security concerns included managing user profiles, standardizing security setup, and running secure e-mail filtering. Check out these tips for help handling those issues and more.
![Also on Search400.com]()
![]()
TIP CONTEST:
Enter to win a Garmin eMap
With the Garmin eMap, you'll never be lost again. Send in your tech tip -- programmer, administrator, security or WebSphere Strategies -- for a chance to receive this cool gadget.
Don't forget to go in and rate our recent tips:
How to encapsulate SNA over TCP
V5R3 view disk IOA cache battery expiration
Find wasted space in files Library list for Web server
SURVEY:
User poll: iSeries revenue decline
IBM blamed the continued slide in iSeries revenue to the slow transition to i5, implying thing will eventually turn around. Are you optimistic or is IBM fighting a losing battle?
Vote now
EXPERT WEBCAST:
IFS security -- Are you prepared?
Speaker: Carol Woodbury, president, CEO, SkyView Partners
The IFS is one of the most ignored areas when it comes to security. But now that more products and OS/400 functionality are implemented in the IFS, ignoring it could put you at risk.
| |
![]() |
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]
Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
|
![]() |
| |
|
![]() |
| |
![]() |
Free E-Newsletters! Select e-newsletters you would like to receive via e-mail!
Search400: Administrator Tips
Search400: Programmer Tips
Search400: Today's News
![]()
![]()
Not a Member? We'll activate your membership with your subscription.
|
![]() |
| |
|
|
![]()
![]() |
![TechTarget - The Most Targeted IT Media]() |
![]() |
This e-newsletter is published by Search400.com, a targeted Web site from TechTarget, the most targeted IT media and events company.
To unsubscribe from "Security Tip":
Go to unsubscribe: http://search400.techtarget.com/unsubscribe?cid=503779&lid=460581&track=NL-236&ad=503779
Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.
Contact Us: Search400 Member Services 117 Kendrick Street, Suite 800 Needham, MA 02494
|
![]() |
|
![]() |
|