Home About BC DR HA Support Training Download
You are here: Home/ GlobalSysAdmin/ Power5/ Please Login or Register

-
Current Location
-

js
  GlobalSysAdmin
    Power5
-
AIX Admin Methodology
Global Consolidation Project
All AIX admins should join
www.aixexpert.com


Join our LinkedIn Group
AIX Advanced Technical Experts
Contract Opportunities

www.LinkedIn.com

-
digg Digg this page
del.icio.us Post to del.icio.us
Slashdot Slashdot it!


LPAR Leasing
Lease an AIX / i5 LPAR
Reduce your costs

www.mtxia.com

Server Leasing
Lease a Server off-site
Reduce your costs

www.mtxia.com

Data Center Automation
Business Continuity and DR
Virtualization/Consolidation

www.mtxia.com

HMC Service
Hardware Management Console
Manage Remote AIX / i5 LPARs

www.siteox.com

Business Web Site Hosting
$3.99 / month includes Tools,
Shopping Cart, Site Builder

www.siteox.com

Disaster Recovery
Small Business Oriented
Off-Site Facilities

www.mtxia.com

IBM pSeries / iSeries
Reduce your Costs
Off-Site Server Hosting

www.mtxia.com

Security Guidelines

  • Where possible all users should be managed by LDAP.
  • Each client or business unit should have independent organizational units within LDAP.


You are responsible for any misuse of your account, even if the inappropriate activity was committed by a friend, family member, guest or employee. Therefore, you must take steps to ensure that others do not gain unauthorized access to your account. In addition, you may not use your account to breach security of another account or attempt to gain unauthorized access to another network or server.

  • Your password provides access to your account. It is your responsibility to keep your password secure.
  • Sharing your password and account access with unauthorized users is prohibited. You should take care to prevent others from using your account since you will be held responsible for such use.
  • Attempting to obtain another user's account password is strictly prohibited, and may result in termination of service.
  • You must adopt adequate security measures to prevent or minimize unauthorized use of your account.
  • You may not attempt to circumvent user authentication or security of any host, network or account. This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access, or probing the security of other networks. Use or distribution of tools designed for compromising security is prohibited. Examples of these tools include, but are not limited to, password guessing programs, cracking tools or network probing tools.
  • You may not attempt to interfere with service to any user, host or network ("denial of service attacks"). This includes, but is not limited to, "flooding" of networks, deliberate attempts to overload a service, and attempts to "crash" a host.
  • Users who violate systems or network security may incur criminal or civil liability. Mt Xia will cooperate fully with investigations of violations of systems or network security at other sites, including cooperating with law enforcement authorities in the investigation of suspected criminal violations.

-
Guidelines
-
 

Policies
Standards (DRAFT)
Procedures


LPAR Leasing
Lease an AIX / i5 LPAR
Reduce your costs

www.mtxia.com

Server Leasing
Lease a Server off-site
Reduce your costs

www.mtxia.com

Data Center Automation
Business Continuity and DR
Virtualization/Consolidation

www.mtxia.com

HMC Service
Hardware Management Console
Manage Remote AIX / i5 LPARs

www.siteox.com

Business Web Site Hosting
$3.99 / month includes Tools,
Shopping Cart, Site Builder

www.siteox.com

FREE Domain Registration
included with Web Site Hosting
Tools, Social Networking, Blog

www.siteox.com

Disaster Recovery
Small Business Oriented
Off-Site Facilities

www.mtxia.com

IBM pSeries / iSeries
Reduce your Costs
Off-Site Server Hosting

www.mtxia.com