Adopey.148
net.followup
utcsrgv!utzoo!decvax!duke!mcnc!unc!dopey.smb
Thu Mar 11 20:44:24 1982
Re: Security and user environments
I agree with Ken Arnold. Way back when, I caught two students poking
around a HASP system I was running. One of them was just curious, and
trying to learn things -- we hired him, and he proved to be our best
weapon in stamping out malicious activity. Not only did we eliminate
one "threat" and get some productive activity out of him; other students
learned from the example -- if all you want to do is learn, come by my
office; I'm always glad to teach system internals. The other guy was
poking around the student grade files; we weren't nearly that generous....
-----------------------------------------------------------------
gopher://quux.org/ conversion by John Goerzen <
[email protected]>
of
http://communication.ucsd.edu/A-News/
This Usenet Oldnews Archive
article may be copied and distributed freely, provided:
1. There is no money collected for the text(s) of the articles.
2. The following notice remains appended to each copy:
The Usenet Oldnews Archive: Compilation Copyright (C) 1981, 1996
Bruce Jones, Henry Spencer, David Wiseman.