Security


What’s New in V7R3 Security? PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 15 April 2016 00:00

Carol discusses the security features coming in the new version of IBM i.

carol woodburyWritten by Carol Woodbury

V7R3 provides some new and changed features in the IBM i integrated auditing function as well as a new feature that will take the guesswork out of implementing object-level security. I want to save the best for last, so I’ll start with the updated auditing features.

Add a comment
Last Updated on Wednesday, 13 April 2016 10:58
Read more...
 
Modernization of IBM i Security PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Steve Pitcher   
Monday, 04 April 2016 01:00

Modernization isn’t just about the user interface, language, and database. You need a security modernization strategy.

steve pitcherWritten by Steve Pitcher

Last week, I did a webcast for COMMON entitled “IBM i and our False Sense of Security” in which I talked about a number of potential vulnerabilities for IBM i partitions. Two areas that I’ve received a lot of feedback on are encryption protocols and ciphers.

Add a comment
Last Updated on Monday, 04 April 2016 01:00
Read more...
 
What's the Difference Between a Profile Swap and Adopted Authority? PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 18 March 2016 01:00

Carol discusses the differences between these two methods of elevating authority on the IBM i.

carol woodburyWritten by Carol Woodbury

Many organizations have the requirement to reduce the number of profiles to which special authorities—especially *ALLOBJ specially authority—have been assigned. In many cases, the excess capabilities can simply be removed because they aren't required for the person to perform their job functions. *SAVSYS special authority is a good example. Unless the person is performing system saves—i.e., is in the role of system operator or system administrator—the user does not need *SAVSYS assigned to their profile.

Add a comment
Last Updated on Tuesday, 15 March 2016 16:22
Read more...
 
User Rating: / 1
PoorBest 
Ethically Hacking IBM i PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Steve Pitcher   
Monday, 07 March 2016 01:00

With a enough time and a little insight, a system that hasn't been properly secured will be exploited.

steve pitcherWritten by Steve Pitcher

A few weeks ago, I wrote a piece called "The Internet of Unprotected Things," which touched on the security concerns of twenty billion connected devices in a few short years, otherwise known as the Internet of Things (IoT).

 

I had a pretty good response to the article. So much so that a number of people asked me to ethically hack their IBM i as an impartial party for intrusion detection purposes. One company was really interested because they were very confident in their abilities in security. To be fair, we all are. There's nothing like giving someone a program you've written and saying, "Try to break it." You learn pretty quickly where the bugs are.

Add a comment
Last Updated on Monday, 07 March 2016 01:00
Read more...
 
User Rating: / 3
PoorBest 
Moving Your IBM i to a Higher Password Level PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 19 February 2016 01:00

Safeguarding and protecting passwords on IBM i demands moving to a higher level. Carol discusses the benefits and provides guidance on changing QPWDLVL to increase password strength.

carol woodburyWritten by Carol Woodbury

There's heightened focus across the IBM i community to improve the power of passwords. That's music to my ears! Here are the considerations you'll have to make when moving the system to a higher password level.

 

The system value QPWDLVL controls the password formats stored as well as the length and character set available for users' passwords. Changes to this system value will take effect with the next IPL. I'll discuss this system value in two sets: Password levels 0 and 1 and password levels 2 and 3.

Add a comment
Last Updated on Friday, 19 February 2016 01:00
Read more...
 
What Treasures Are in Those Reports on Your IBM i's IFS? PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 22 January 2016 01:00

Carol provides guidance on protecting data in printed reports.

carol woodburyWritten by Carol Woodbury

I get inspiration for this column from a variety of places, but I have to give credit to one of my clients for this article. As he duly pointed out, there's a lot of "interesting" information to be found in spooled files and in PDFs in IFS directories that are left on the system—sometimes for a very long time. So thanks to TJ for inspiring me to write about this important topic.

Add a comment

Last Updated on Monday, 18 January 2016 14:02
Read more...
 
"Mission Attainable: Rogue Server" PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Robin Tatam   
Monday, 04 January 2016 01:00

A Hollywood Blockbuster Cluster

robin tatamWritten by Robin Tatam

Government agent Heathen Runt slips into his specialized climbing gear, and in a pocket of his magnetic backpack, he stashes the thumb drive he will use to access the server. He then embarks on the long, arduous ascent to the top of the precipice that marks home to the impenetrable data center belonging to the evil organization known as Server People Hampering Integration of New Core Technologies, or SPHINCTer.

Add a comment
Last Updated on Monday, 04 January 2016 01:00
Read more...
 
What Perturbs Carol About IBM i Security? PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 18 December 2015 01:00

Carol provides her pet peeves when it comes to IBM i security configuration.

carol woodburyWritten by Carol Woodbury

At this time of year, many lists of favorites are published, but I thought I'd take a slightly different twist and publish my list of IBM i security pet peeves.

Add a comment
Last Updated on Friday, 18 December 2015 01:00
Read more...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 45

WEBCAST

MC Webcast CenterFEATURED WEBCAST

See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:

 

  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 

 

Watch the Webinar Now!

 

TRIAL SOFTWARE

MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.

   MC-STORE.COM