I ask this because I am curious.  

If someone does reach an AS/400 sign-in screen, can they get in if the
instructions from IBM have been followed about service passwords, etc.?  

My understanding of firewalls is that they are designed more to keep those
inside, inside.  

So far as attacks from outside, do they happen successfully on any but the
most casual of installations?   One always fears that a great gaping
security hole will be discovered, but that doesn't seem to happen any more
often than a company has its phone system attacked, or fraudulent bills
sent in for Accounts Payable payment.

In the end I wonder if much of our worry about internet security will calm
down once we get a bit more used to it.  Recently someone was telling
about the security he'd placed on his web site where he had his
advertising.  I asked him if he was really worried about someone breaking
in and stealing his promotions and advertisements.  He didn't see the
point of my question to him. 

Please understand, I am not advocating here, nor suggesting.  I am trying
to learn.  

In <005801bdb6a6$d45c7f60$65bc56d1@atlpc1>, on 07/23/98 
   at 10:00 PM, "Carl Galgano" <cgalgano@ediconsulting.com> said:

>I agree with the addition of an ISP between the remote PC and the
>Internet, however, your config allows the AS400 to be accessed direclty
>via the internet and that bothers me....
>Carl Galgano

Booth Martin

| This is the Midrange System Mailing List!
| To submit a new message, send your mail to MIDRANGE-L@midrange.com.
| To subscribe to this list send email to MIDRANGE-L-SUB@midrange.com.
| To unsubscribe from this list send email to MIDRANGE-L-UNSUB@midrange.com.
| Questions should be directed to the list owner/operator: david@midrange.com

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2019 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].