|
Andy, > Rather than going into the safe, you could always go into > dedicated service > tools and reset the QSECOFR password to its default. You > would also need, I > believe, the original QSECOFR profile to reset the DST > passwords to their > defaults. To be truly effective, you would need to hide > both the OS/400 and > DST QSECOFR profiles. I'm not sure I would involve the > CEO and a safe > however; the only time you would really need that profile > would be at 2:00 > AM on a Sunday morning. I may not have been as clear about my question as I had hoped - what I'm really trying to get at is this: Aside from what was listed in the original post, what other reasons might someone need to retrieve the QSECOFR password (regardless of where it is stored for safety). Thanks, jte -- John Earl | Chief Technology Officer The PowerTech Group 19426 68th Ave. S Seattle, WA 98032 (253) 872-7788 ext. 302 john.earl@xxxxxxxxxxxxx www.powertech.com This email message and any attachments are intended only for the use of the intended recipients and may contain information that is privileged and confidential. If you are not the intended recipient, any dissemination, distribution, or copying is strictly prohibited. If you received this email message in error, please immediately notify the sender by replying to this email message, or by telephone, and delete the message from your email system. --
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.