Security Articles and Tutorials by Dan Riehl
Common Sense Security Auditing
Review options for configuring QAUDJRN auditing options for IBM i.
Are your user profiles open to Abuse?
Can your User profiles be hijacked for abuse?
Nefarious Masqueraders - IBM i Trojan Horse programs
How and where can Trojans be inserted into IBM i?
Security Toolbox Essentials for Managing User Profiles
Dormant users, Default Passwords and Group memberhip.
Exit Points for i/OS Control Language Commands Part 1
Examines the detail of the CHANGE CL command exit program
Exit Points for i/OS Control Language Commands Part 2
Examines the detail of the RETRIEVE CL command exit program
Watch this space for additional articles!
|