Security


Take an IBM i Security Quiz PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 17 June 2016 00:00

Carol provides a quiz to test your knowledge of IBM i security facts.

carol woodburyWritten by Carol Woodbury

Many times, I want to make sure to tell everyone about an interesting IBM i security feature or make sure everyone knows how something works or point out some quirky fact, but it really isn’t enough to write a full article on the topic. So I decided to communicate these topics via a quiz. I hope you enjoy this alternative means of learning about IBM i security!

Add a comment
Last Updated on Friday, 17 June 2016 00:00
Read more...
 
Book Review: IBM i Security Administration and Compliance, Second Edition PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Pat Botz   
Friday, 10 June 2016 00:00

If you have only one book for security administration and compliance on the IBM i, this is the one you should have.

patrick botzReviewed by Patrick Botz

IBM i Security Administration and Compliance, Second Edition, the latest version of Carol Woodbury’s well-known IBM i security reference, starts with Carol laying out her goals for the book, which are to provide the reader with choices, practical implementation examples, insight into the appropriate security scheme for your organization, and time-saving tips. I think she hits the ball out of the park. Not only does the book provide valuable technical information, it also introduces the reader to fundamental concepts of information security management.

Add a comment
Last Updated on Friday, 10 June 2016 00:00
Read more...
 
IBM i Exit Points: What They Are and When to Use Them PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 20 May 2016 00:00

Carol explains the concept of exit programs and provides examples of how they can be used to customize your IBM i administration.

carol woodburyWritten by Carol Woodbury

The terms “exit point” and “exit program” are often used but are rarely explained. New exit points are added to most IBM i releases, so I thought it might be helpful to explain exit points and provide some examples of how you might use them in your organization.

Add a comment
Last Updated on Friday, 20 May 2016 00:00
Read more...
 
Growing Interest in IBM i Security PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Steve Pitcher   
Monday, 16 May 2016 00:00

PowerTech's State of IBM i Security Study is provoking interest and hopefully will be viewed as a call to action.

steve pitcherWritten by Steve Pitcher

PowerTech has recently released the 2016 State of IBM i Security Study. I sat down with the author of the study, Robin Tatam, to discuss the study and the resurgence of the IBM i community's interest in security.

Add a comment
Last Updated on Monday, 16 May 2016 15:39
Read more...
 
What’s New in V7R3 Security? PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 15 April 2016 00:00

Carol discusses the security features coming in the new version of IBM i.

carol woodburyWritten by Carol Woodbury

V7R3 provides some new and changed features in the IBM i integrated auditing function as well as a new feature that will take the guesswork out of implementing object-level security. I want to save the best for last, so I’ll start with the updated auditing features.

Add a comment
Last Updated on Wednesday, 13 April 2016 10:58
Read more...
 
Modernization of IBM i Security PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Steve Pitcher   
Monday, 04 April 2016 01:00

Modernization isn’t just about the user interface, language, and database. You need a security modernization strategy.

steve pitcherWritten by Steve Pitcher

Last week, I did a webcast for COMMON entitled “IBM i and our False Sense of Security” in which I talked about a number of potential vulnerabilities for IBM i partitions. Two areas that I’ve received a lot of feedback on are encryption protocols and ciphers.

Add a comment
Last Updated on Monday, 04 April 2016 01:00
Read more...
 
What's the Difference Between a Profile Swap and Adopted Authority? PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 18 March 2016 01:00

Carol discusses the differences between these two methods of elevating authority on the IBM i.

carol woodburyWritten by Carol Woodbury

Many organizations have the requirement to reduce the number of profiles to which special authorities—especially *ALLOBJ specially authority—have been assigned. In many cases, the excess capabilities can simply be removed because they aren't required for the person to perform their job functions. *SAVSYS special authority is a good example. Unless the person is performing system saves—i.e., is in the role of system operator or system administrator—the user does not need *SAVSYS assigned to their profile.

Add a comment
Last Updated on Tuesday, 15 March 2016 16:22
Read more...
 
User Rating: / 1
PoorBest 
Ethically Hacking IBM i PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Steve Pitcher   
Monday, 07 March 2016 01:00

With a enough time and a little insight, a system that hasn't been properly secured will be exploited.

steve pitcherWritten by Steve Pitcher

A few weeks ago, I wrote a piece called "The Internet of Unprotected Things," which touched on the security concerns of twenty billion connected devices in a few short years, otherwise known as the Internet of Things (IoT).

 

I had a pretty good response to the article. So much so that a number of people asked me to ethically hack their IBM i as an impartial party for intrusion detection purposes. One company was really interested because they were very confident in their abilities in security. To be fair, we all are. There's nothing like giving someone a program you've written and saying, "Try to break it." You learn pretty quickly where the bugs are.

Add a comment
Last Updated on Monday, 07 March 2016 01:00
Read more...
 
User Rating: / 3
PoorBest 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 45

WEBCAST

MC Webcast CenterFEATURED WEBCAST

See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:

 

  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 

 

Watch the Webinar Now!

 

TRIAL SOFTWARE

MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.

   MC-STORE.COM