13.07.2015 17:24, swobje...@outlook.com wrote: > In this case, the user with the highest granted permissions to corrupt > and/or destory anything is kwown to the attacker.
Fortunately, the attacker doesn't know if this user exists at all. Those who care about security, can skip its creation or drop it later. -- WBR, SD. ------------------------------------------------------------------------------ Don't Limit Your Business. Reach for the Cloud. GigeNET's Cloud Solutions provide you with the tools and support that you need to offload your IT needs and focus on growing your business. Configured For All Businesses. Start Your Cloud Today. https://www.gigenetcloud.com/ Firebird-Devel mailing list, web interface at https://lists.sourceforge.net/lists/listinfo/firebird-devel