REPOSTED FOR A NON-MEMBER <[EMAIL PROTECTED]>
In 15 years with my last job, I know of 3 times when bored users found their way into parts of the system that should not have been accessable, but were left open through a philosophy of security by obscurity on the part of the developer. In 2 of those cases the user reported the problem, and in the third, significant damage was done (by accident, on the part of a user who had gotten their hands on a manual and was trying to select vustomers by install date, but instead ran an install program). I also know of 2 attempts by disgruntled former employees to do damage, one successful, again because of security by obscurity. So it does happen. ------- u2-users mailing list [email protected] To unsubscribe please visit http://listserver.u2ug.org/
