Adopey.148 net.followup utcsrgv!utzoo!decvax!duke!mcnc!unc!dopey.smb Thu Mar 11 20:44:24 1982 Re: Security and user environments I agree with Ken Arnold. Way back when, I caught two students poking around a HASP system I was running. One of them was just curious, and trying to learn things -- we hired him, and he proved to be our best weapon in stamping out malicious activity. Not only did we eliminate one "threat" and get some productive activity out of him; other students learned from the example -- if all you want to do is learn, come by my office; I'm always glad to teach system internals. The other guy was poking around the student grade files; we weren't nearly that generous.... ----------------------------------------------------------------- gopher://quux.org/ conversion by John Goerzen of http://communication.ucsd.edu/A-News/ This Usenet Oldnews Archive article may be copied and distributed freely, provided: 1. There is no money collected for the text(s) of the articles. 2. The following notice remains appended to each copy: The Usenet Oldnews Archive: Compilation Copyright (C) 1981, 1996 Bruce Jones, Henry Spencer, David Wiseman.