Adopey.148
net.followup
utcsrgv!utzoo!decvax!duke!mcnc!unc!dopey.smb
Thu Mar 11 20:44:24 1982
Re: Security and user environments
I agree with Ken Arnold.  Way back when, I caught two students poking
around a HASP system I was running.  One of them was just curious, and
trying to learn things -- we hired him, and he proved to be our best
weapon in stamping out malicious activity.  Not only did we eliminate
one "threat" and get some productive activity out of him; other students
learned from the example -- if all you want to do is learn, come by my
office; I'm always glad to teach system internals.  The other guy was
poking around the student grade files; we weren't nearly that generous....

-----------------------------------------------------------------
gopher://quux.org/ conversion by John Goerzen <[email protected]>
of http://communication.ucsd.edu/A-News/


This Usenet Oldnews Archive
article may be copied and distributed freely, provided:

1. There is no money collected for the text(s) of the articles.

2. The following notice remains appended to each copy:

The Usenet Oldnews Archive: Compilation Copyright (C) 1981, 1996
Bruce Jones, Henry Spencer, David Wiseman.