Title: Security Tip
  February 08, 2005 Published by  Search400.com   

Security Tip

search400.com
News Topics ITKnowledge Exchange Tips Ask the Experts Webcasts White Papers
Issue Sponsored By:
  >  Data Center Decisions

IN THIS ISSUE:
  >  Restrict *PUBLIC access to critical OS components
  >  Time to review your *PUBLIC authority setups
  >  The danger of indiscriminately assigning special authorities
  >  Preventing users from uploading data
  >  Top 10 security tips of 2004
  >  Enter to win a Garmin eMap
  >  User poll: iSeries revenue decline

Headlines


Restrict *PUBLIC access to critical OS components
[Search400.com]
As a security officer, you are responsible for keeping a tight rein on your system. To add just another level of confidence, take a look at running the Revoke Public Authority (RVKPUBAUT) command on your system to restrict the use of certain critical OS/400 commands and API objects.
MORE INFO:
View previous tips by Rich Loeber


 
 
Attend Data Center Decisions 2005
Join us in New York for Data Center Decisions 2005. Learn about the latest technologies for the data center, get top advice from industry experts & win a new Mercedes SLK. Register today.
 
 

Time to review your *PUBLIC authority setups
[Search400.com]
OS/400's robust security architecture lets you specify security authorization at a variety of levels -- from the individual profile level to the group profile level and even supplemental group profile level. If, however, your system has default setups for *PUBLIC authority that are too broad in nature, all the little details at the other levels could easily be frustrated. It is important to understand how your *PUBLIC authorities are set and to review them periodically.

The danger of indiscriminately assigning special authorities
[Search400.com]
In this tip, security guru Dan Riehl explains the special authorities and points out the main exposures if they are not assigned judiciously.

Preventing users from uploading data
[Search400.com]
One user writes, "I'm in the process of implementing ODBC on my iSeries. How can I prevent users from uploading data back to the iSeries? I have no problem with my users downloading data; I don't want them uploading data. Also, can security be placed at the library level?" Security expert Carol Woodbury offers some advice.

Top 10 security tips of 2004
[Search400.com]
Last year top security concerns included managing user profiles, standardizing security setup, and running secure e-mail filtering. Check out these tips for help handling those issues and more.

Also on Search400.com


TIP CONTEST:  Enter to win a Garmin eMap
With the Garmin eMap, you'll never be lost again. Send in your tech tip -- programmer, administrator, security or WebSphere Strategies -- for a chance to receive this cool gadget.

Don't forget to go in and rate our recent tips:
How to encapsulate SNA over TCP
V5R3 view disk IOA cache battery expiration
Find wasted space in files
Library list for Web server

SURVEY:  User poll: iSeries revenue decline
IBM blamed the continued slide in iSeries revenue to the slow transition to i5, implying thing will eventually turn around. Are you optimistic or is IBM fighting a losing battle?

Vote now

EXPERT WEBCAST:  IFS security -- Are you prepared?
Speaker: Carol Woodbury, president, CEO, SkyView Partners

The IFS is one of the most ignored areas when it comes to security. But now that more products and OS/400 functionality are implemented in the IFS, ignoring it could put you at risk.


 
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]

Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
 
 
Free E-Newsletters!
Select e-newsletters you would like to receive via e-mail!

 Search400: Administrator Tips
 Search400: Programmer Tips
 Search400: Today's News




Not a Member? We'll activate your membership with your subscription.
 




TechTarget - The Most Targeted IT Media This e-newsletter is published by Search400.com, a targeted Web site from TechTarget, the most targeted IT media and events company.

To unsubscribe from "Security Tip":
Go to unsubscribe: http://search400.techtarget.com/unsubscribe?cid=503779&lid=460581&track=NL-236&ad=503779

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Contact Us:
Search400
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to