× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



This is a multi-part message in MIME format.
--
PC anywhere has a password, your PC has a password and the AS/400 has a 
password.
Plus someone has to know the dial-in phone number.

I never said ti was perfect, but it works.

MacWheel99@aol.com wrote:

> > > I use PC Anywhere to dial in to my PC and then start a session on the
> >  AS/400.
> >
> >  So, you have THREE machines.
>
> You have
> (1) Home PC which dials into
> (2) Work PC which signs onto
> (3) AS/400
>
> Now if you can dial into the work PC so can a hacker.
> What is the protection?
> Perhaps the AS/400 has a password.
> Perhaps the Work PC has a password.
> Perhaps the Work PC is on a version of Windows where security cannot be
> bypassed by an astute Windoze expert.
> Depending on how the Home PC is connecting to the Work PC
> perhaps a hacker is seeing those passwords being transmitted clear enough.
>
> Or is the home PC to work PC tunneling through a secure encrypted VPN?
> Your home PC had better have real good security so that a hacker does not see
> how to get into that VPN & simulate being you.
>
> If you want to do any restricted stuff, does this mean that the work PC is
> the main console?  If the work PC is connect to ma bell so that the home PC
> can dial in, it does not matter how secure or insecure the home PC is, that
> work PC is a hacker magnet.  How often do you change its passwords & how many
> wrong guesses before it is varied off?
>
> Of course the original question was not how to prevent hackers from trashing
> your AS/400 it was how to let anyone including the person asking the
> question, do anything they damn well please on the AS/400 without actually
> being there ... lots of ways to do that, like leave explosives in computer
> room & go home & push the radio control button ... same effect, just more
> obvious what you done.  <G>
>
> Perhaps 2 machines work.  Perhaps not.
> Get an extremely baby AS/400 at home.
> Connect to work AS/400 over the ECS line.
> Perhaps there is a protocol there that can be encrypted no matter how brain
> dead your local ma bell connection is.
> Your extremely baby AS/400 at home might be networked to a home PC inside the
> firewall.
>
> MacWheel99@aol.com (Alister Wm Macintyre) (Al Mac)
> _______________________________________________
> This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list
> To post a message email: MIDRANGE-L@midrange.com
> To subscribe, unsubscribe, or change list options,
> visit: http://lists.midrange.com/cgi-bin/listinfo/midrange-l
> or email: MIDRANGE-L-request@midrange.com
> Before posting, please take a moment to review the archives
> at http://archive.midrange.com/midrange-l.
--
Content-Description: Card for Jeffry Kennedy

[ jkennedy.vcf of type text/x-vcard deleted ]
--



As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:
Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.