Jennifer,

Thanks for the response, and the secret ;-)

I wonder if it (the secret) works with the roles reversed?  (Yeah, I
think it would -- however, there's some of us that don't enjoy doing
"what works" -- though that's probably true with the roles reversed also
;-) 

Randy Kramer

jennifer wrote:
> One thing thing thats great about logging in as a regular user and
> "SUING" when you have to is that you really begin to understand the
> inner-workings of that system. personally, being an all to trusting
> Admin in a NT environment, I feel too comfortable with the rights. You
> don't know exactly what you can do and the user can't, which foroges the
> purpose of security in a network. I certainly wouldn't want to be
> responsible for setting up a critical system share only to give everyone
> and their alter-ego permissions to it. (I hate being called to the
> office...I had enough in high school) <smiles>  In any event, forgive me
> if this point has already been made, I honestly did not read through the
> entire thread before responding. But if your purpose is for a insecure
> user friendly internet machine, stay with windows...no harm done. But if
> you want to get intmate enough with the system to adminster its every
> move, learn how it works and manipulate it.
> 
> (apologies for the last comment...I think I just gave out one of womens
> biggest secrets on how to control men) <smiles<

Reply via email to