Steve Fulton wrote:

Simply authenticating based on IP has already
proven an obsolete method.



How and to whom?



Reply via email to