Advice, opinions, and ideas sought.
Sean Casey
sean at ms.uky.edu
Wed Jun 26 23:56:31 AEST 1991
mike at snowhite.EEAP.CWRU.Edu (Mike Sidman) writes:
|The second deals with security. How would you monitor or approach
|person "A" if a different person (person "B" - friend, curious quasi-
|hacker, etc.) is utilizing person "A"'s account?
Don't worry about it unless A's account is causing problems. Make sure
that A knows they are 100% responsible for *anything* B ever does with
A's account. If you make that quite clear, things tend to take care of
themselves.
Sean
--
** Sean Casey <sean at s.ms.uky.edu>
** Recent subject line in comp.sys.handhelds: Printing BIG GROBS
More information about the Comp.unix.admin
mailing list