Advice, opinions, and ideas sought.

Sean Casey sean at ms.uky.edu
Wed Jun 26 23:56:31 AEST 1991


mike at snowhite.EEAP.CWRU.Edu (Mike Sidman) writes:

|The second deals with security.  How would you monitor or approach
|person "A" if a different person (person "B" - friend, curious quasi-
|hacker, etc.) is utilizing person "A"'s account?

Don't worry about it unless A's account is causing problems. Make sure
that A knows they are 100% responsible for *anything* B ever does with
A's account. If you make that quite clear, things tend to take care of
themselves.

Sean
-- 
** Sean Casey  <sean at s.ms.uky.edu>
** Recent subject line in comp.sys.handhelds:  Printing BIG GROBS



More information about the Comp.unix.admin mailing list