× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Rob,

When a PC connects to System I A it is a client of System I A and System I A is the PC's host. Before the connection to System I A is made the PC is the host.

System I A wants to connect to Systemb. Before the connection is made System I A is the host and Systemb is the target.


Gary Monnier
IT Software Engineer II
T  425.895.6457  
F  425.556.8777  
E  Gary.Monnier@xxxxxxxxx

Terex Aerial Work Platforms
18465 NE 68th St.
Redmond, WA  98052
www.genielift.com


-----Original Message-----
From: midrange-l-bounces@xxxxxxxxxxxx [mailto:midrange-l-bounces@xxxxxxxxxxxx] On Behalf Of rob@xxxxxxxxx
Sent: Thursday, May 17, 2012 12:58 PM
To: Midrange Systems Technical Discussion
Subject: RE: RMTCMD's security?

Gary,

What do you mean by "host"? I really don't mean this as sarcasm.


Rob Berendt
--
IBM Certified System Administrator - IBM i 6.1 Group Dekko Dept 1600 Mail to: 2505 Dekko Drive
Garrett, IN 46738
Ship to: Dock 108
6928N 400E
Kendallville, IN 46755
http://www.dekko.com





From: "Monnier, Gary" <Gary.Monnier@xxxxxxxxx>
To: Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxx>,
Date: 05/17/2012 03:46 PM
Subject: RE: RMTCMD's security?
Sent by: midrange-l-bounces@xxxxxxxxxxxx



Rob,

Nope. Are you blind?

I'm just amazed at responses seemingly disregarding host system security.

I just want to make sure I understand what is being said before I call
B***t.

Gary Monnier


-----Original Message-----
From: midrange-l-bounces@xxxxxxxxxxxx [
mailto:midrange-l-bounces@xxxxxxxxxxxx] On Behalf Of rob@xxxxxxxxx
Sent: Thursday, May 17, 2012 12:17 PM
To: Midrange Systems Technical Discussion
Subject: RE: RMTCMD's security?

Gary,

did your email reader chop this off from the bottom of Scott's message:

On 5/17/2012 11:27 AM, rob@xxxxxxxxx wrote:
Should you be securing the "from" machine (ie the system they initiate
the remote command from), or should you be securing the "to" machine?


Rob Berendt
--
IBM Certified System Administrator - IBM i 6.1 Group Dekko Dept 1600 Mail
to: 2505 Dekko Drive
Garrett, IN 46738
Ship to: Dock 108
6928N 400E
Kendallville, IN 46755
http://www.dekko.com





From: "Monnier, Gary" <Gary.Monnier@xxxxxxxxx>
To: Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxx>,
Date: 05/17/2012 03:13 PM
Subject: RE: RMTCMD's security?
Sent by: midrange-l-bounces@xxxxxxxxxxxx



Scott,

By "to" machine do you mean the target system or the host system?

Gary Monnier


-----Original Message-----
From: midrange-l-bounces@xxxxxxxxxxxx [
mailto:midrange-l-bounces@xxxxxxxxxxxx] On Behalf Of Scott Klement
Sent: Thursday, May 17, 2012 11:12 AM
To: Midrange Systems Technical Discussion
Subject: Re: RMTCMD's security?

You should always secure the "to" machine. Securing the "from" machine
isn't even worthy of being called "security".

On 5/17/2012 11:27 AM, rob@xxxxxxxxx wrote:
Should you be securing the "from" machine (ie the system they initiate
the remote command from), or should you be securing the "to" machine?

--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe,
unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a
moment to review the archives at http://archive.midrange.com/midrange-l.


As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.