December 8, 2010 Wayne O. Evans
In Part 1 of this article, I mentioned the importance of being aware of common security exposures. I described five of the 10 most common security exposures and provided suggestions for minimizing risk. This article covers the remaining five security exposures.
Exposure #6: Unrestricted use of IBM Navigator for i.
IBM provides IBM Navigator for i (formerly called iSeries Navigator and Operations Navigator) as the graphical user interface for OS/400 functions. This powerful interface can be used in place of a command line to manage the security of objects, display data file content, and even delete objects. IBM Navigator, like