...
An unauthorized attempt is already a security violation.
...

But, an attempt that should not have succeeded could end up making headlines.

-teD
(The secret to success is sincerity.
If you can fake that,
you've got it made!)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to