Newsletter Archives
Search the Newsletter Archives

March 1, 2017
Authorization List Misconceptions
*AUTL Dynamic Object Authorities

February 22, 2017
What is a User Class?

December 28, 2016
Stealing User Profiles
Using RMTCMD i/ file

January 5, 2016
Invisible Data Access
Save All Your Spooled Files

August 12, 2015
Network Access Control and
    Logging with Exit Programs
FTP Exit Point Logon Exposure

July 15, 2015
Tracking Access to Your
      Sensitive Files
Save Spool File Reports

May 27, 2015
Securing Sensitive CL Commands
      from Abuse    
Command Use When Securing CL

May 13, 2015
Easily Manage Journals
    with RMVJRNRCV
    By Carsten Flensberg
QSECURITY Auditor Fake Out

April 22, 2015
Create Real-Time Alerts
    for CL Command Execution
Command Exit Pgms - Part 2

March 25, 2015
When was your last SAVSECDTA, SAVSYS, SAVCFG?
Danger - Libraries above QSYS

March 11, 2015
The Command Line Restriction -
    Limited Capabilities
Video - Limited Capabilities

February 11, 2015
Intrusion Detection on IBM i
Control IDS from CL Command
     By Carsten Flensburg

January 14, 2015
Fixing Save/Restore
      Authority Problems
Copy User Authorities

December 10, 2014
Auditing Exit Point Security
Tracking Job Schedule Changes

November 12, 2014
Create User Profile
    Forcing Your Policy
Who's in that Group?
Virus Worms Malware?

October 22, 2014
I Can Be You!
    Exploiting a User Profile Flaw

October 8, 2014
Are Sensitive Reports Secure?
Saving QAUDJRN Data

September 24, 2014
Forensic Analysis -
Track Changes to your Database
Danger - Libraries Above QSYS

September 10, 2014
Auditing and Reporting
    on CL Command Usage
Video - Limited Capabilities
Quick Look at Group Profiles

August 27, 2014
Adopted Authority and
    the Mysteries of QUSEADPAUT
Easy Reporting on Users

August 13, 2014
Restrict Access to the
    System Request Key - Why?
When was last SAVSYS?

July 23, 2014
Save and Restore Reports
    The Mysteries Revealed
Auditing in QSYS and IFS

July 9, 2014
I Know Your Password!
Disable and Delete Users

June 11, 2014
Why Use Authorization Lists?
w/Guest Carol Woodbury

May 28, 2014
Command Exit Pgms Part 1
Library Authorities

May 14, 2014
The CHGPRF Command
Change my own Profile, Really?
Virus, Worms, Malware

April 23, 2014
Fooled by Authorization Lists?
More on AUTLs

April 9, 2014
User Limited Capabilities?
Group Profiles - Who's Who?

March 26, 2014
The Threat
- Invisible Data Theft on IBM i

March 12, 2014
Using Adopted Authority
for Password Resets
and Profile Changes

February 26, 2014
Do you Ever Really Log-Off?
Blocking Password Changes

February 12, 2014
CL Command Vulnerability
    By Carsten Flensburg
Stop Adopted Authority

January 8, 2014
User Profile Security
    The Inactivity Time-Out
Top New Security Features

December 11, 2013
Tracking Database Changes
QINACTITV Misconceptions
   The Inactivity Time-Out

November 13, 2013
Forensic Analysis - QAUDJRN
Track Access to Sensitive Files

October 23, 2013
Intrusion Detection System
Control the IDS

October 9, 2013
Library List Vulnerabilities
Libraries Higher than QSYS

September 25, 2013
Problems in Private Authorities
Analysis of User Profiles

September 12, 2013
Misconceptions of User Class
Using RMTCMD.exe

August 28, 2013
Create User Profile Exit Program
Audit the Exit Point Registry

August 14, 2013
Unprotected Spooled Files
Using GRTUSRAUT command

July 10, 2013
Smart Control of CL Commands
Change Journaling Options

June 26, 2013
Control Accesss with
  Application Administration
    By Carol Woodbury

June 12, 2013
What is an Exit Program?
Exit Program Exposures

May 22, 2013
Auditing User Activity
Authorization Lists

May 8, 2013
Auditing CL Command Usage
Reporting from QAUDJRN

April 24, 2013
IBM i Mysteries of
Restoring Spooled Files
Watch out for CHGPRF!

March 27, 2013
    By Patrick Townsend

March 13, 2013
Secure TCP/IP and Host Servers
Protect your Exit Points

February 27, 2013
Lock System Values
Auditing the Exit Points

February 13, 2013
Stop Adopted Authority!
New CL Built-In Functions 2013

January 23, 2013
Are you Saving the Right Stuff?
Using Authorization Lists Video

January 9, 2013
John Earl Memorial Tribute
To our Friend and Mentor

December 5, 2012
The "Hidden" Security Options
Numeric UserID & Password

November 14, 2012
The World's Easiest IBM i Heist?
    By Robin Tatam
Auditing New Objects

October 24, 2012
Hijack a User Profile
Security for New Objects

October 3, 2012
Avoid Unsanctioned IBM i Access
About Library Authorities

September 12, 2012
Watch Out! Adopting Objects
Save All Spooled Files

August 15, 2012
Save and Restore Authorities
Copying User Authorities

August 1, 2012
CL Command Security
    By Carsten Flensburg

July 18, 2012
Top 5 Security Questions
    By Carol Woodbury
Restricting System Request

July 10, 2012
Command Line Access
Misconceptions of LMTCPB

June 20, 2012
Caveat for Adopted Authority

June 6, 2012
Invisible Data Access and
  Data Theft
Hijacking User Profiles

May 23, 2012
Securing FTP and ODBC with
  Exit Programs
Carsten's CL command to Control the IBM i IDS

May 9, 2012
Forensic Analysis QAUDJRN
Part 2 - Tracing User Activity

March 28, 2012
Leaky Data - Spooled Files
Where is Sensitive Data?

March 14, 2012
Manage the Online Retention of your Audit Data
By Carsten Flensburg

February 29, 2012
Control Query Output Files
By Carsten Flensburg

February 15, 2012
Why use Authorization lists?
By Carol Woodbury

February 1, 2012
Forensic Analysis QAUDJRN

January 18, 2012
Protecting System Values

January 4, 2012
IBM i Intrusion Detection

December 20, 2011
Control Adopted Authority

December 6, 2011
Virus Worms Malware

November 22, 2011
Fixing Exposed User Profiles

November 8, 2011
Close the Open Pipe

October 25, 2011
Undetectable Data Theft

October 11, 2011
What is Function Usage?
Application Administration


SecureMyi Security Newsletter for the IBM i

Welcome to the Security and Systems Management Newsletter for IBM i, iSeries and AS/400. Subscribe to the newsletter and receive access to all of our Educational Videos, Webcasts, Security Software Product Reviews, Load-and-Go utilily software and great articles from the top industry experts.

International IBM i Security and Systems expert Dan Riehl and other top industry guest authors will provide you with the information you need to stay current in the highly complex and dynamic area of IBM i Security, Compliance and Systems Management.

A regular feature is the popular Security Shorts column which provides easily digestible tips and techniques that will help you manage the security, compliance and integrity of the IBM i.

Many issues will present an educational YouTube Video or Audio presentation discussing a particular aspect of IBM i Security or Systems Management.

In addition, each issue will present in-depth Feature Articles on an IBM i Security and Systems topics that will convey to the reader a deep understanding of the topic.

A calendar of IBM i Security related EVENTS is presented, as is the important NEWS from around the IBM i Security community.

Newsletter Editor - Dan Riehl

Dan Riehl is the Founder and President of the IT Security and Compliance Group, LLC.( He is also the Founder and President (and Instructor) for IBM i training provider, The 400 School, Inc.

Dan previously served as the Founder and President of the IBM i security software vendor PowerTech.

Dan is familiar to most IBM i professionals through his many books, magazine articles and webcasts regarding IBM i security and other technical topics. Security

Training for IBM i iSeries and AS400

Home Services Training Resources Contact Us
Copyright © 2011-2017 IT Security and Compliance Group.   All rights reserved.