|
> Also, someone mentioned that if someone knows the user id, they > can get the password. Once again, this would rely on **very** specialized > knowledge as well as a special user profile authoization adoption to do > this. In other words, it has to be an "inside job." 80% of all computer crimes are committed by insiders. That is where the danger is. Forget about the hacker trying to get in from the outside, (s)he does not know what is valuable data on the system and what to do with it. Beware of the insider. +--- | This is the Midrange System Mailing List! | To submit a new message, send your mail to MIDRANGE-L@midrange.com. | To subscribe to this list send email to MIDRANGE-L-SUB@midrange.com. | To unsubscribe from this list send email to MIDRANGE-L-UNSUB@midrange.com. | Questions should be directed to the list owner/operator: david@midrange.com +---
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.