Another option is to use the exit point programs to secure ODBC, FTP, RMTCMD and others. Exit programs controls...
that are allowed to read, update, and delete files that are accessed from the remote systems. There are exit programs for Client Access servers as well as for DDM and TCP/IP connections. We can even write our own exit point programs.
MORE INFORMATION ON THIS TOPIC
The Best Web Links: Tips, tutorials and more.
Search400's targeted search engine: Get relevant information on security.
Ask your systems management questions--or help out your peers by answering them--in our live discussion forums.
Read this Search400 Featured Topic: Secure your iSeries