13.07.2015 17:24, swobje...@outlook.com wrote:
> In this case, the user with the highest granted permissions to corrupt
> and/or destory anything is kwown to the attacker.

   Fortunately, the attacker doesn't know if this user exists at all. Those who 
care about 
security, can skip its creation or drop it later.

-- 
   WBR, SD.

------------------------------------------------------------------------------
Don't Limit Your Business. Reach for the Cloud.
GigeNET's Cloud Solutions provide you with the tools and support that
you need to offload your IT needs and focus on growing your business.
Configured For All Businesses. Start Your Cloud Today.
https://www.gigenetcloud.com/
Firebird-Devel mailing list, web interface at 
https://lists.sourceforge.net/lists/listinfo/firebird-devel

Reply via email to