× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.




Probably a strong step - as long as the user does not have the ability to change their own initial program.

jte

On Aug 19, 2011, at 6:14 PM, Bdietz400 wrote:

If you are just interested in the users that actually sign on, you can just change the initial program to call the QDCRDEVD API to get the ip address not the user.
https://www-304.ibm.com/support/docview.wss?uid=nas1ed43f4e3329a4a838625726c005d8be4

Bryan

On Aug 18, 2011, at 12:35 PM, "Monnier, Gary" <Gary.Monnier@xxxxxxxxx> wrote:

Robert,

Yes, I have some experience with exit programs including the Telnet
device initialization exit point.. What is it you want to do?

Gary Monnier

-----Original Message-----
From: midrange-l-bounces@xxxxxxxxxxxx
[mailto:midrange-l-bounces@xxxxxxxxxxxx] On Behalf Of Robert Munday
Sent: Thursday, August 18, 2011 8:30 AM
To: Midrange List
Subject: TELNET Project


Greetings from the sunny south.





I have been tasked with capturing the user profiles and IP addresses
of
those who sign into our system remotely. An analyst has directed me
to
the IBM site for instructions on TELNET processing. It uses a
program at
the Exit Point - QIBM_QTG_DEVINIT, and this is where I am to capture
the
data. I have downloaded and am reviewing the programs from the IBM
site.



Have you worked with this type of data capture? It's new to me and I
seek
your guidance.



Thanks,







Robert Munday

Munday Software Consultants

Montgomery, AL
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe,
unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a
moment to review the archives at http://archive.midrange.com/midrange-l.

--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.


--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.


--
John Earl
President and CEO,
Townsend Security
360-359-4418
townsendsecurity.com
The Encryption Company


As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:
Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.