Advice, opinions, and ideas sought.
    Sean Casey 
    sean at ms.uky.edu
       
    Wed Jun 26 23:56:31 AEST 1991
    
    
  
mike at snowhite.EEAP.CWRU.Edu (Mike Sidman) writes:
|The second deals with security.  How would you monitor or approach
|person "A" if a different person (person "B" - friend, curious quasi-
|hacker, etc.) is utilizing person "A"'s account?
Don't worry about it unless A's account is causing problems. Make sure
that A knows they are 100% responsible for *anything* B ever does with
A's account. If you make that quite clear, things tend to take care of
themselves.
Sean
-- 
** Sean Casey  <sean at s.ms.uky.edu>
** Recent subject line in comp.sys.handhelds:  Printing BIG GROBS
    
    
More information about the Comp.unix.admin
mailing list