Allen S. Rout wrote:
>
> I'll echo "use the CAD".  It is straightforward.

Too bad most TSM client security vulnerabilities have been in the CAD
(notably, the remotely-exploitable ones)...

--
Hello World.                                    David Bronder - Systems Admin
Segmentation Fault                                      ITS-EI, Univ. of Iowa
Core dumped, disk trashed, quota filled, soda warm.   [email protected]

Reply via email to