MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

February 11, 2011 | Volume 8 Issue 6


TOP STORY: TechTip: Control User Profile Sign-On Behavior
FEATURED ARTICLE: Authority Swapper Helps Get a Handle on Internal Security
NEWS HIGHLIGHT: Try IBM Modernization Tools in the Cloud
FORUM: Write-Deploy-Consume XML/SOAP Web Services over HTTP in RPGLE
BUYER'S GUIDE: WebSmart ILE and Barcode 400
BUSINESS CONTINUITY TODAY: Ch.11: Is the Cloud Right for You?
Manage Subscription | Contact Us

Feature Article - Security
TechTip: Control User Profile Sign-On Behavior

Don't waste time coding CL programs to disable and re-enable profiles. Instead, use commands that the fine folks at IBM have made just for that purpose!

steve_pitcherWritten by Steven C. Pitcher

We've all had user profiles we wanted under our thumbs a little tighter.


Let's say you have a couple of temporary work-term students who will be at your company for the next six months. What happens? Chances are you are verbally notified by their manager the day they arrive with the expectation of a laptop, email account, and IBM i access. Then you set them up like any other user, along with instructions on how to operate the old-school coffee machine, of course. Six months go by, and you've forgotten all about those kids who've now gone back to school. Perhaps someone in HR will let you know they're gone and give you a formal request to disable their profiles, but I think that's more the exception than the rule in most shops.


Feature Article - Security
Authority Swapper Helps Get a Handle on Internal Security

The recently released utility from Halcyon gives system administrators the ability to grant temporary authorities to users and then monitor their activities during a limited period.

chris_smithWritten by Chris Smith

A friend of mine had her identity stolen and suddenly started receiving thousands of dollars in random credit card charges before she knew what hit her. It turned out that a disgruntled employee working at the financial institution holding her mortgage had downloaded and sold her personal information—along with that of thousands of other customers—to an international crime ring. Could this happen at your company, and should you be so unlucky, how long would it take you to realize there was a security breach?


MC Showcase Buyer's Guide

Featured Products

WebSmart ILE lets you Modernize iSeries applications easier and has more integrated solutions to take you further! WebSmart is the easiest and most complete iSeries Web Application Development tool. WebSmart has everything you need to successfully develop new browser-based apps and modernize existing ones.

Whether you are part of a Fortune 100 or SMB organization, a one person shop or part of a larger team, you can immediately build new web applications or start transforming and modernizing legacy iSeries applications to real, professional-quality, database-driven Web applications. The PC based IDE is easy-to-learn, runs on HTTP Apache web server and does NOT need WebSphere. Create applications using Web Services, SOA, AJAX, XML, email, output to Excel, graphs. WebSmart offers these optional integrated solutions for complete modernization: • Clover Query • Free* Nexus Portal • Catapult • Free* RDW • SmartCharts (Free feature)


Learn more about Business Computer Design Int'l, Inc. and its products here.


T.L. Ashford's award winning BARCODE400 software is the labeling answer for the iSeries. With this versatile and easy to use software you will be designing and printing labels in minutes. Compliance labeling is a snap using templates provide by TL Ashford.

Learn more about T.L. Ashford & Associates and its Barcode and RFID solutions here.


Want to feature your company products? Click here or call (208) 726-6822 for information.


In the News

Support MC Press - Visit Our Sponsors


Forums Sponsor





Search Sponsor




Business Continuity Today

E-Magazine: Business Continuity Today from Vision Solutions, Inc.


Latest Chapter: Business Continuity Today Ch.11: Is the Cloud Right for You?


Business Continuity Today Ch. 1: Planning for Business Resilience

Business Continuity Today Ch. 2: Security Threats, Trends and Risks

Business Continuity Today Ch. 3: Optimizing Data Availability in Information Hungry Organizations

Business Continuity Today Ch. 4: Compliance and the New Reality for IT Resiliency

Business Continuity Today Ch. 5: Maintaining Availability with Virtualization Technologies

Business Continuity Today Ch. 6: Data Replication: Making Sense of the Options

Business Continuity Today Ch. 7: Recovery: Strategies for Resilience

Business Continuity Today Ch. 8: BCROI: Measuring Returns on Your Business Investment

Business Continuity Today Ch. 9: Making the Green Connection: Ensuring Sustainability and Continuity

Business Continuity Today Ch.10: Disaster Recovery by the Numbers