Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
Bill Horne wrote: > > I love this part: "/... control of data security passwords to ensure > that such passwords are kept in a location and/or format that does not > compromise the security of the data they protect ..."/ > > So, does that mean that the tape on the bottom of the keyboard isn't > secure? Do I have to tell my customers to stop using their middle names? > > Bill > My favorite is "(e) blocking access to user identification after multiple unsuccessful attempts to gain access or the limitation placed on access for the particular system;" How many is multiple, exactly? :) - Ryan
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |