AIX Top Stories

AIX > ADMINSTRATOR > SYSTEMS MANAGEMENT!

Introduction to HMC V8 Templates

AIX > TRENDS > WHAT'S NEW!

Introduction to HMC V8 Templates

AIX > ADMINISTRATOR > NETWORKS!

Tunneling With SSH to Your Destination

sponsored content

FEATURED WEBINARS

Webinar Event Center

View all upcoming and recorded Webinars hosted by IBM Systems Magazine

>> VIEW ALL ON DEMAND WEBINARS

>> VIEW ALL CURRENT WEBINARS

LATEST AIX BLOGS

Michael AM Felt

Things To Have Done Early in 2015

Happy New Year! I wanted to provide you with a checklist of things you should do early this year. Here’s the list and then I’ll dive deeper into each item:

  1. Activate aixpert at level medium or stricter.
  2. Review or configure syslog.
  3. Review or configure audit.
  4. Set password algorithm to ssha256.
  5. Disable login/su for “idle” accounts.

Rob McNelly

Security Behind the Firewall

Although many of us like to assert that AIX running on Power hardware is a secure operating system, we must be aware of methods that might be used to try to compromise the systems we maintain. Just because the AIX user base is smaller than their Windows or Linux counterparts, we shouldn't assume that AIX systems cannot be breached and aren't being targeted. These systems typically run software for hospitals, banks, manufacturers, etc., industries where uptime and performance are critical and data privacy is essential.

Vendor Marketplace


WHITEPAPER CENTER for AIX

IBM Systems Magazine Subscribe Box Read Now Link Subscribe Now Link iPad App Google Play Store
AIX News Sign Up Today! Past News Letters

EVENTS AND EDUCATION: AIX

0 Results Found for January 2015

Next 6 Months: Feb 2015 | Mar 2015 | Apr 2015 | May 2015 | Jun 2015 | Jul 2015



Find Products

Find Companies

Access 2015 Online Buyer's Guide Now!