Monthly Archives: July 2012
I find the “Krebs on Security” blog often has incredibly interesting stories. Here’s one that discusses how the author was the target of a hack that was used to help sell a distributed denial of service (DDoS) “service.”
Here’s an article from Power IT Pro that discusses a bit about using Kerberos in the AIX environment. With a few more configuration steps on Windows Active Directory, you can integrate AIX into Windows domain authentication also.
Ever wish you could access detailed documentation on enhancements delivered for IBM i via PTF? Here’s some information from IBM pointing to resources that I have found useful in learning about new security enhancements.
Several years ago, I wrote an article for IBM i customers detailing the security questions they should ask their software vendors before buying — or at least before paying. Well, Michael Hickins, an editor for the Wall Street Journal recently … Continue reading
Josette Rigsby at MidsizeInsider.com recently posted a blog article called Five Signs Your Cloud Computing Security Is Out of Control.