|
> > I use PC Anywhere to dial in to my PC and then start a session on the > AS/400. > > So, you have THREE machines. You have (1) Home PC which dials into (2) Work PC which signs onto (3) AS/400 Now if you can dial into the work PC so can a hacker. What is the protection? Perhaps the AS/400 has a password. Perhaps the Work PC has a password. Perhaps the Work PC is on a version of Windows where security cannot be bypassed by an astute Windoze expert. Depending on how the Home PC is connecting to the Work PC perhaps a hacker is seeing those passwords being transmitted clear enough. Or is the home PC to work PC tunneling through a secure encrypted VPN? Your home PC had better have real good security so that a hacker does not see how to get into that VPN & simulate being you. If you want to do any restricted stuff, does this mean that the work PC is the main console? If the work PC is connect to ma bell so that the home PC can dial in, it does not matter how secure or insecure the home PC is, that work PC is a hacker magnet. How often do you change its passwords & how many wrong guesses before it is varied off? Of course the original question was not how to prevent hackers from trashing your AS/400 it was how to let anyone including the person asking the question, do anything they damn well please on the AS/400 without actually being there ... lots of ways to do that, like leave explosives in computer room & go home & push the radio control button ... same effect, just more obvious what you done. <G> Perhaps 2 machines work. Perhaps not. Get an extremely baby AS/400 at home. Connect to work AS/400 over the ECS line. Perhaps there is a protocol there that can be encrypted no matter how brain dead your local ma bell connection is. Your extremely baby AS/400 at home might be networked to a home PC inside the firewall. MacWheel99@aol.com (Alister Wm Macintyre) (Al Mac)
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.