The difference between Level 30 and Level 40 is that 30 allows calls to
undocumented system API's whilst 40 doesn't.  If you have some bad
program(mer)s you may find that your applications fall over under 40 whereas
they will work under 30.  You can use the system auditing to enable checking
for this sort of activity.

You can use the security wizard from Client Access Express Operations
Navigator - it's great, informative and friendly.

Dwayne Lindner
Senior Analyst - Data Centre
Wesfarmers Rural Division
184 Railway Parade, Bassendean WA 6054
Ph: (08) 9273 5365    Mob: 0407 386 693
Email: dwayne.lindner@writ.wesfarmers.com.au

-----Original Message-----
From: Frank Reiss [mailto:freiss47@yahoo.com]
Sent: Tuesday, 23 January 2001 00:20
To: MIDRANGE-L@midrange.com
Subject: AS/400 Security



What is the difference between level 30 and 40 - I had always thought that
40 was a better choice. Also, what are some of the basic security concerns
on the AS/400, on a system that has no connection to the internet, but does
have PC file transfers. 
If there is a FAQ on all this kindly direct me to it.
Thanks,
Frank




Do You Yahoo!?
Yahoo! Auctions - Buy the things you want at great prices.
+---
| This is the Midrange System Mailing List!
| To submit a new message, send your mail to MIDRANGE-L@midrange.com.
| To subscribe to this list send email to MIDRANGE-L-SUB@midrange.com.
| To unsubscribe from this list send email to MIDRANGE-L-UNSUB@midrange.com.
| Questions should be directed to the list owner/operator: david@midrange.com
+---

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2019 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].