SecureMyi Security Newsletter for IBM i

Newsletter Archives - Updated March 19, 2019

Newsletter Main Topics Date of Issue
1) Invisible Data Theft on IBM i - Preventing the Invisible

2) Specifying Object Authorities for Newly Created Objects
March 19, 2019
1) Preventing Matching Passwords in IBM i V7R2M0

2) CL Program Source Code to Save all Spooled Files
March 5, 2019
1) The RESETUSER Command - Use Adopted Authority for Password Resets
              with Needed Safeguards

2) Caveat when using Adopted Authority - What you Can't do with Adopted Authority
October 30, 2018
1) Just What is 'User Limited Capabilities', Really?

2) Auditing Changes to your Job Schedule - WRKJOBSCDE
October 15, 2018
1) Do you Every Really Logoff? IBM i Access with CWBLOGON

2) Audit Newly Created Objects and IFS Contents using QAUDJRN
August 1, 2018
1) Ban All Default Passwords using System Values *LMTPRFNAME and *ALLCRTCHG

2) Control Language Program to Save All your Spooled Files (Source Code Included)
July 18, 2018
1) *SECOFR User Class Does NOT make you Powerful

2) Copying Private Authorities from one User to Another

 
July 4, 2018
1) Common Misconceptions about Using Authorization Lists

2) Using Authorization Lists for Dynamic Object Authority Assignment

 
March 1, 2017
1 When was your Last SAVSYS SAVCFG and SAVSECDTA, and Where are They?

2) *SECOFR User Class does not make for a Powerful User

 
February 22, 2017
1) Stealing User Profiles

2) Using Remote Command for running Multiple CL Commands - RMTCMD i/ filename

 
December 28, 2016
1) Invisible Data Access

2) Save All Your Spooled Files

 
December 28, 2016
1) Network Access Control and Logging with Exit Programs - Source Code Included

2) FTP Exit Point Program Can Provide a Major Logon Exposure

 
August 12, 2015
1) Tracking Access to Your Sensitive Files

2) Save Spool File Reports - CL Program Source Code Included

 
July 15, 2015
1) Securing Sensitive CL Commands from Abuse

2) When Securing Commands, Don't Miss any Command Users

 
May 27, 2015
1) Easily Manage Journals with RMVJRNRCV - Source Code Included
    By Carsten Flensberg

2) QSECURITY - Security Level System Value - The Auditor Fake Out

 
May 13, 2015
1) Create Real-Time Alerts for CL Command Execution - Source Code Included

2) Command Exit Programs - Part 2 - Source Code Included

 
April 22, 2015
1) When was your last SAVSECDTA, SAVSYS, SAVCFG?

2) Library List Potential Danger - Libraries above QSYS

 
March 25, 2015
1) The Command Line Restriction - Limited Capabilities Functionality & Misconceptions

2) Video Presentation - Understanding Limited Capabilities

 
March 11, 2015
1) Setting up the Intrusion Detection System on IBM i

2) Control IDS from CL Commands - Source Code Included
     By Carsten Flensburg

 
February 11, 2015
1) Fixing Save/Restore Authority Problems

2) Copy User Authorities

 
January 14, 2015
1) Auditing Exit Point Security and WRKREGINF

2) Tracking Changes to the Job Schedule

 
December 10, 2014
1) Create User Profile - Enforce Rules in Exit Programs - Source Code Included

2) Who's in that Group? Analysis of Group Profiles

3) Video - Is your System Vulnerable to Virus Worms Malware?

 
November 12, 2014
1) I Can Be You! Exploiting a User Profile Authorization Flaw

2) Using The Windows IBM i Access Remote Command Client - RMTCMD Options

3) Video - I Can Be You - Hijacking a User Profile

 
October 22, 2014
1) Are Your Sensitive Reports Secure?

2) Are You Saving QAUDJRN Security Audit Journal Data?

 
October 8, 2014
1) Forensic Analysis - Track Changes to your Database

2) Library List Potential Danger - Libraries Above QSYS

 
September 24, 2014
1) Forensic Analysis - Auditing and Reporting on CL Command Usage

2) CL Commands - Take a Quick Look at Group Profiles

3) Video - Understanding Limited Capabilities - Features and Misconceptions

 
September 10, 2014
 
1) Adopted Authority and the Mysteries of the QUSEADPAUT System Value

2) Easy Reporting on User Profile Attributes

 
August 27, 2014
1) Restricting Access to the System Request Key - Why?

2) When was your previous SAVSYS?

 
August 13, 2014
1) Save and Restore Reports - The Mysteries Revealed

2) Auditing in QSYS and in the IFS

 
July 23, 2014
1) I Know Your Password! The Default is at Fault!

2) Configuring User Profile Expiration and Activiation Schedules

 
July 9, 2014
1) Why Use Authorization Lists?
     by Carol Woodbury

2) Changing Database Journaling Options on the Fly

 
June 11, 2014
1) CL Command Exit Pgms Part 1 - The Command Analyzer Change Exit Point
    Source Code Included

2) Understanding Library Authorities

 
May 28, 2014
1) The CHGPRF Command - Change my own Profile, Really?

2) All Numeric Passwords and User IDs

3) Video - Is your system infected by Virus Worms or other Malware

 
May 14, 2014
1) Don't Be Fooled by the use of an Authorization Lists?

2) Dynamic Flexibility when using Authorization Lists

3) Video - Misconceptions when using Authorization Lists

 
April 23, 2014
1) Understanding User Limited Capabilities?

2) Take a Quick Look at Group Profiles

3) Video - Understanding Limited Capabilities - Features and Misconceptions

 
April 9, 2014
 
1) The Threat - Invisible Data Theft on IBM i

2) Get a Full Backup of your Spooled Files - Source Code Included - SAVESPLF

 
March 26, 2014
1) Using Adopted Authority for Password Resets and Profile Changes
     Source Code Included - RESETUSER

2) Adopted Authority Cannot Do Everything - Limitations When Using Adopted Authority

 
March 12, 2014
1) Do you Ever Really Log-Off?    Using CWBLOGON for Shut Down
     Source Code Included LOGOFF.BAT

2) Blocking Password Changes - The System Values QPWDRQDDIF & QPWDCHGBLK

 
February 26, 2014
1) Working with CL Command Security Attributes - Source Code Included WRKCMDSEC
    By Carsten Flensburg

2) Stop/Stop Adopted Authority Using the MI built-in function MODINVAU

 
February 12, 2014
1) User Profile Security - and SST/DST Service Tools UserID Security

2) QINACTITV PTF Updates -   The Inactivity Time-Out Update to be More Exact

3) Video - Top New Security Features for IBM i
       by Carol Woodbury

 
January 8, 2014
1) Tracking Database Changes - Database Journals and Monitoring Tools

2) QINACTITV Misconceptions -  The Inactivity Time-Out
       See January 8 Issues for Correction

 
December 11, 2013
1) Forensic Analysis - Using QAUDJRN to Track Access to Sensitive Files

2) Setting the Authority for New Objects

3) Video - Is IBM i Vulnerable by Virus, Worms or other Malware

 
November 13, 2013
1) Understanding the IDS - Intrusion Detection System on IBM i

2) Control the Intrusion Detection System using custom CL Commands

     Source Code Included CTLIDS Command
     By Carsten Flensburg

 
October 23, 2013
1) Discovering Problems in Private Authorities

2) Analysis of User Profiles

3) Video - The "Hidden" Security Options for IBM i

     Exploring WRKFCNUSG and Application Administration

 
September 25, 2013
1) Misconceptions of the User Profile's User Class - What does it do?

2) Using RMTCMD.exe for muliple commands - Security Implications

 
September 12, 2013
1) Exit Program for Create User Profile - Set Ownership and *PUBLIC Authority
    Source Code Included for CRTPRFEXIT CL program

2) Auditing Changes to the Exit Point Registry - WRKREGINF ADDEXITPGM etc.

 
August 28, 2013
1) Dangers of Sensitive Spooled Files Reports that are Not Secured

2) Using GRTUSRAUT command to Copy Authorities from One User to Another

 
August 14, 2013
1) Intelligent Control of Sensitive CL Commands

2) Dynamically Changing Journaling Options

 
July 10, 2013
1) 5 Ways to Control Access using Application Administration
    by Carol Woodbury

2) Yes, I have a Numeric UserID and Password. And You?

 
June 26, 2013
1) What is an Exit Program? Detailed information on Exit Point Programs
   Source Code Included - FTP Logon Exit Point Program to Accept/Reject Logon

2) Exit Program Exposures - Logon to the IBM i - No UserID or Password Required

 
June 12, 2013
1) QAUDJRN - Auditing User Activity

2) Polular Misconceptions on Authorities to Libraries

3) Video - Misconceptions When using Authorization Lists

 
May 22, 2013
1) QAUDJRN - Auditing Control Language Command Usage

2) QAUDJRN Information Extraction Methods

3) Video - Yes, I Can Steal Your User Profile!

 
May 8, 2013
1) IBM i Mysteries of Restoring Spooled Files and Output Queues

2) Watch out for CHGPRF!     Change Your Own User Profile!?

 
April 24, 2013
1) What is FIELDPROC for IBM i 7.1 and Why Do I Care?
    By Patrick Townsend

2) Setting the Authority for New Objects

 
March 27, 2013
1) Secure TCP/IP and Host Servers
     And Changing the IBM Supplied Commands STRTCPSVR and ENDTCPSVR

2) Protect your Exit Points - Registered Exit Programs – Some Vulnerabilities?

 
March 13, 2013
1) Protecting Security Related System Values from Modification using System Service Tools (SST/DST)

2) Auditing the Exit Points and WRKREGINF - Using QAUDJRN

3) Video - Misconceptions of User Profile Limited Capabilities - LMTCPB(*YES)

 
February 27, 2013
1) Are you Saving the Right Stuff?

2) Important Objects that May Be Improperly Excluded from your Backup Process

3) Video - Common Misconceptions - Using Authorization Lists

 
January 23, 2013
1) John Earl Memorial Tribute - To our Friend and Mentor

2) Tracking QSECOFR with the IBM Security APIs (Swap Profile) - With Source Code
        by John Earl

3) Where Does *PUBLIC Get All That Authority?
        by John Earl

 
January 9, 2013
1) The "Hidden" Security Options - WRKFCNUSG - Application Administration

2) Numeric UserIDs & Passwords

3) Video - The "Hidden" Security Options

 
December 5, 2012
1) The World's Easiest IBM i Heist?
    By Robin Tatam

2) Auditing New Objects

3) Video - The Pitfalls of Relying on a 1982 Security Scheme

 
November 14, 2012
1) "Hijack" a User Profile on IBM i

2) Setting the Authority for New Objects

3) Video - "Hijack" a User Profile on IBM i

 
October 24, 2012
1) Avoid Unsanctioned 'Drive by' Access to IBM i - and CWBLOGON Script

2) Misconceptions on Authorities to Libraries

 
October 3, 2012
1) Watch Out! Detecting New Adopting Objects

2) Save all Spooled File Reports - Source Code Included - SAVESPLF

 
September 12, 2012
1) Fixing your Save/Restore Inconsistencies in Private Authorities

2) Copying Authorities from one User to Another - CL Command GRTOBJAUT

 
August 15, 2012
1) Work with Command Security - Command WRKCMDSEC - Source Code Included
      by Carsten Flensburg

2) When was your last SAVSYS, SAVCFG, SAVSECDTA?

3) Video - Common Misconceptions - Using Authorization Lists

 
August 1, 2012
1) Top 5 Security Questions for IBM i
    By Carol Woodbury

2) Restricting Access to System Request - SYSRQS

3) Video - The "Hidden" Security Options - WRKFCNUSG - Application Administration

 
July 18, 2012
1) Misconception - Command Line Access and "Limited Capabilities" Users

2) Watch out for the CHGPRF command!

3) Video - Misconceptions of User Profile Limited Capabilities

 
July 10, 2012
1) Mysteries of the QUSEADPAUT System Value

2) Caveat - Managing User Profiles Under Adopted Authority - Limitations

 
June 20, 2012
1) Invisible Data Access - Undetectable Data Theft on IBM i

2) Stronger Enforcement of Password Differences in IBM i 6.1 - QPWDCHGBLK and QPWDRQDDIF

3) Video - Are your User Profiles Vulnerable to Profile Hijacking?

 
June 6, 2012
1) Exit Points and Exit Programs - Explained and Illustrated - Source Code Included

2) CL Command to Manage the Intrusion Detection System - Source Code Included
     by Carsten Flensburg

3) Logon to the IBM i - No UserID or Password Required (Within the FTP Exit Program)

 
May 23, 2012
1) Forensic Analysis using QAUDJRN Part 2 - Tracing User Activity

2) Alternative to Extracting and Formatting QAUDJRN

3) Video - Misconceptions on Ownership and Authority to User Profiles

 
May 9, 2012
1) A Tale of Leaky Data - UnSecured Spooled Files

2) Protecting Sensitive Data – But - Where is it?

3) Video - The Pitfalls of Relying on a 1982 Security Scheme

 
March 28, 2012
1) Managing the Online Retention of Audit Data - Source Code Included RMVJRNRCV
     by Carsten Flensburg

2) Registered Exit Programs - What You Don’t Know Can Hurt You !

3) Video - IBM i Security - Function Usage - The Secret Security Options

 
March 14, 2012
1) Controlling IBM Query/400 Output Files - Source Code Included RMVJRNRCV
     by Carsten Flensburg

2) *SECOFR User Class Does Not Make A User Powerful

3) Video - Misconceptions on User Limited Capabilities LMTCPB(*YES)

 
February 29, 2012
1) Why use Authorization Lists?
     by Carol Woodbury

2) Changing Database Journaling Options on the Fly

3) Video - Common Misconceptions - Using Authorization Lists

 
February 15, 2012
1) Forensic Analysis using QAUDJRN - CL Command Usage

2) The Truth About Library Authorities

 
February 1, 2012
1) Protecting Your Security System Values from Modification - SST Lock

2) Stronger Enforcement of Password Differences in IBM i 6.1 - QPWDCHGBLK

3) Video - How to Identify and Fix Your Vulnerable User Profiles

 
January 18, 2012
1) The IBM i Intrusion Detection System - IDS

2) Who Removed my Exit Program? QAUDJRN and WRKREGINF

3) Video - The Pitfalls of Relying on a 1982 Security Scheme

 
January 4, 2012
1) The Problem With Too Many IBM i Private Authorities

2) Stop Adoption of Authority in the Calling Program - MODINVAU

3) Video - Misconceptions on User Limited Capabilities LMTCPB(*YES)

 
December 20, 2011
1) Correctly Securing Powerful and Sensitive Commands

2) My IBM i UserID is 77 and My Password is 123456

3) Video - Is the IBM i Vulnerable to Virus, Worms and other Malware?

 
December 6, 2011
1) Customizing the IBM 'Create User Profile' Process by Adding Your Own Logic

2) Watch out for CHGPRF!
      Did you know that your end users and staff can change their own user profile?

3) Video - Common Misconceptions - Using Authorization Lists

 
November 22, 2011
1) Close the 'Open Pipe': Flush your Signon Server Credentials

2) Auditing Newly Created Objects

3) Video - The Hidden Security Configuration Options

 
November 8, 2011
1) Invisible IBM i Data Access - Undetectable Data Theft

2) Quick Reporting on User Profiles

3) Video - Popular Misconceptions - Authority to, and Ownership of User Profiles

 
October 25, 2011
1) IBM i Hidden Configuration Options

2) Insight into your Group Profiles

3) Video - Popular Misconceptions on User Limited Capabilities

 
October 11, 2011