|
What we do is to install SLIC from the CD's taking the option to wipe out the old disk config. It's faster than deleting libraries and guarantees that you are deleting *EVERYTHING. Very unlikely, but an old authorization list or user profile in QSYS could provide a hacker a clue as to how to break into your system. If you shipped out an IBM licensed program to someone who doesn't have that product licensed, IBM could theoretically go after you. (Although in practice they seem to be nice people. Please don't quote the last sentence, it might spoil my reputation!) Al Al Barsa, Jr. Barsa Consulting Group, LLC 400>390 914-251-1234 914-251-9406 fax http://www.barsaconsulting.com http://www.taatool.com Jeff Glenn <Jeff.Glenn@GlennConsu To: midrange-l@midrange.com lting.com> cc: Sent by: Subject: Preparing a System for Sale midrange-l-admin@midra nge.com 02/28/02 09:16 AM Please respond to midrange-l What's the proper way to remove data from an older AS/400 that's being sold? Is deleting the non-system libraries enough? Thanks, Jeff _______________________________________________ This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list To post a message email: MIDRANGE-L@midrange.com To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/cgi-bin/listinfo/midrange-l or email: MIDRANGE-L-request@midrange.com Before posting, please take a moment to review the archives at http://archive.midrange.com/midrange-l.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.