The difference between Level 30 and Level 40 is that 30 allows calls to undocumented system API's whilst 40 doesn't. If you have some bad program(mer)s you may find that your applications fall over under 40 whereas they will work under 30. You can use the system auditing to enable checking for this sort of activity. You can use the security wizard from Client Access Express Operations Navigator - it's great, informative and friendly. Dwayne Lindner Senior Analyst - Data Centre Wesfarmers Rural Division 184 Railway Parade, Bassendean WA 6054 Ph: (08) 9273 5365 Mob: 0407 386 693 Email: firstname.lastname@example.org -----Original Message----- From: Frank Reiss [mailto:email@example.com] Sent: Tuesday, 23 January 2001 00:20 To: MIDRANGE-L@midrange.com Subject: AS/400 Security What is the difference between level 30 and 40 - I had always thought that 40 was a better choice. Also, what are some of the basic security concerns on the AS/400, on a system that has no connection to the internet, but does have PC file transfers. If there is a FAQ on all this kindly direct me to it. Thanks, Frank Do You Yahoo!? Yahoo! Auctions - Buy the things you want at great prices. +--- | This is the Midrange System Mailing List! | To submit a new message, send your mail to MIDRANGE-L@midrange.com. | To subscribe to this list send email to MIDRANGE-L-SUB@midrange.com. | To unsubscribe from this list send email to MIDRANGE-L-UNSUB@midrange.com. | Questions should be directed to the list owner/operator: firstname.lastname@example.org +---
As an Amazon Associate we earn from qualifying purchases.
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.