Allen S. Rout wrote: > > I'll echo "use the CAD". It is straightforward.
Too bad most TSM client security vulnerabilities have been in the CAD (notably, the remotely-exploitable ones)... -- Hello World. David Bronder - Systems Admin Segmentation Fault ITS-EI, Univ. of Iowa Core dumped, disk trashed, quota filled, soda warm. [email protected]
