|
Hi Oliver, The loopholes are called PCs - ODBC etc! And everyone has them these days. You may need to look at security APIs or 3rd party protection. Clare Clare Holtham Director, Small Blue Ltd - Archiving for BPCS Web: www.smallblue.co.uk IBM Certified AS/400 Systems Professional E-Mail: Clare.Holtham@xxxxxxxxxxxxxx Mobile: +44 (0)7960 665958 ----- Original Message ----- From: <oliver.wenzel@xxxxxxxxxxxxxxxxxxxxxxx> To: <midrange-l@xxxxxxxxxxxx> Sent: Thursday, March 20, 2003 10:05 AM Subject: Security questions > Hello, > > we have OS/400 security set up by the book - i.e. basically user has no > rights (limit capabilities *yes) to execute commands etc. > For productive data and objects user only have *read or *use authority. > The used programs belong to the application owner profile > and have adopted authority. System access for users goes through a menu > system. > > So, where are the loopholes in this config? > > Thanks, > > Oliver > _______________________________________________ > This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list > To post a message email: MIDRANGE-L@xxxxxxxxxxxx > To subscribe, unsubscribe, or change list options, > visit: http://lists.midrange.com/mailman/listinfo/midrange-l > or email: MIDRANGE-L-request@xxxxxxxxxxxx > Before posting, please take a moment to review the archives > at http://archive.midrange.com/midrange-l. > >
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.