×
The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.
On 12/12/2007, rob@xxxxxxxxx <rob@xxxxxxxxx> wrote:
On the low end of the spectrum is using one of the accounting firms out
there to do your i5 security. They are stuck with the same old format of
questions from 20 years ago, like QLMTDEVSSN. Jeepers, why limit someone
to one 5250 session and allow them to connect 27 ways with ODBC, etc?
At a previous but recent client one of the big accounting firms was
supposed to do a security audit on our i5. They claimed they had
developed their own software package to do this. They sent my boss a
CD containing the software and a short list of instructions. He sent
it to me to run for them. The package turned out to be nothing more
than a CL program running a series of standard IBM commands such as
DSPPGMADP to *outfile. The "package" converted the output files to
plain comma separated text which they wanted sending back to them as
an e-mail attachment.
As the techie contractor there they should probably have been more
wary of me than almost anyone else in the company. But there I was not
only collecting their data but in a position to make any edits I liked
before returning it, and as Rob points out extremely basic in any
case. Definitely go with one of the genuine i5 specialists.
As an Amazon Associate we earn from qualifying purchases.