Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
On 2/1/2010 10:11 PM, Ryan Pugatch wrote: > > My favorite is "(e) blocking access to user identification after > multiple unsuccessful attempts to gain access or the limitation placed > on access for the particular system;" > > How many is multiple, exactly? :) > > You know, it just occurred to me that this could be a golden opportunity: " ... /Education and training of employees on the proper use of the computer security system and the importance of personal information security/ ..." ... and here I've been cutting my fingers on the back of old PC cases, when I can be sitting at the head of the class ... Bill -- E. William Horne William Warren Consulting Computer & Network Installations, Security, and Service http://william-warren.com 781-784-7287
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |