MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

December 22, 2008 | Vol 3 Issue 23


In This Issue:

Feature Article - Security
Combatting Wireless Security Threats

How do you let the good guys in while keeping the bad guys out?

By Chris Peters

A lack of physical security combined with diabolical social engineering practices presents an ongoing challenge to network security personnel. Even if your company doesn't have a wireless network, it's a pretty sure bet that some of the laptops in your organization have built-in wireless capability. That means that a wireless laptop could act as a bridge, forming an opportunity for access to your internal network to anyone with an antenna, some precocious software, and the will to hack into your world.


Feature Article - Security
Your IBM i Security Probably Isn't as Good as You Think It Is

Do you really know that your security is what it should and could be?

john_earl.jpgBy John Earl

Editor's Note: This article is an excerpt from the white paper "The State of System i (AS/400) Security," which can be downloaded free from the MC White Paper Center.


How good is the security on your IBM i (System i, iSeries, AS/400)? Are you confident about the controls you have put in place? Can you demonstrate that you're compliant with regulatory requirements that affect your industry? Do you know whether your system is better secured than the average System i?


Support MC Press - Visit Our Sponsors
iTM 12-22-2008


Forums Sponsor


 Popular Forums



   Search Sponsor


 Popular Searches