REPOSTED FOR A NON-MEMBER   <[EMAIL PROTECTED]>

In 15 years with my last job, I know of 3 times when bored users found their 
way into parts of the system that should not have been accessable, but were 
left open through a philosophy of security by obscurity on the part of the 
developer. In 2 of those cases the user reported the problem, and in the third, 
significant damage was done (by accident, on the part of a user who had gotten 
their hands on a manual and was trying to select vustomers by install date, but 
instead ran an install program). I also know of 2 attempts by disgruntled 
former employees to do damage, one successful, again because of security by 
obscurity. So it does happen.
-------
u2-users mailing list
[email protected]
To unsubscribe please visit http://listserver.u2ug.org/

Reply via email to