Hello Amit,
There's always risks, but I think it depends on the situation and the
relation with the other party.
You can add them as a non-root or non-admin user and always monitor
their usage, also explain to them that they must follow your existing
computer use policies or there access will be
With great power comes great responsibility ... works everywhere :-)
Thank you Aaron!, just wanted to learn if I had missed out any possibilities as
well.
Amit
> -Original Message-
> From: Aaron Peeler [mailto:fapee...@ncsu.edu]
> Sent: Tuesday, July 19, 2011 8:15 AM
> To: vcl-dev@incu