Well, they are internal users. And, they are in a valid subnet. So, I am
thinking all we can do is log them. I gave the information to one
gentleman. He was able to pretty much pinpoint the culprit down. But
he's not going to act on it anymore until given permission to KSA.

Rob Berendt

This thread ...

Follow-Ups:
Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2019 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].