MAGAZINES

MC Press Resource Centers
MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power

June 20, 2008 | Vol 5 Issue 25

 

In This Issue:

>> TechTip: Securely Delete Files on Desktops and Servers

>> Being Cute with Passwords Eventually Might Be Very Costly

>> Partner TechTip: Utilizing the QUSEADPAUT System Value

Feature Article - TechTip
 
TechTip: Securely Delete Files on Desktops and Servers

Several tools available for Windows and Linux desktops allow you to securely delete files containing sensitive information.

max_hetrick.jpgBy Max Hetrick

In the past, I wrote a tip on how to securely erase an entire hard drive and also mentioned that the best way to dispose of a dead or dying hard drive is to physically destroy it. This method of destroying sensitive information is perfect if you're actually disposing of the hardware, but it doesn't solve the problem of securely destroying information at a file level within a working file system.


Read More >>

Feature Article - Security
 
Being Cute with Passwords Eventually Might Be Very Costly

Using a random-number generator, however, can give you an unbreakable password.

chris_smith.jpgBy Chris Smith

I've been writing for the past few weeks about security and encryption and ways to take care of yourself and your computer in the face of some pretty--shall we say--"obsessive behavior" by numerous people using the Internet who aren't very nice.

 

I have to confess that when I thought up my most common password, variations of which I use for just about everything, I imagined a classroom of sixth-graders sitting around trying to guess what it is.


Read More >>

Advertorial - SkyView Partners, Inc.
 
Partner TechTip: Utilizing the QUSEADPAUT System Value

What does the Use adopted authority program attribute do?

carol_woodbury.gifBy Carol Woodbury

I've told you about adopted authority, which gives users temporary access to objects or additional authorities. I've explained that adopted authority is a program attribute and that to make a program adopt, the User profile parameter needs to be set to *OWNER (rather than the default setting of *USER.) However, I've neglected to explain the Use adopted authority program attribute and its role in the adopted authority flow.


Read More >>

Support MC Press - Visit Our Sponsors

 

Forums Sponsor

 

 Popular Forums

POPULAR FORUMS

Forums

 

Search Sponsor
  
 

 Popular Searches

POPULAR SEARCHES

Search


Read More >>
   MC-STORE.COM