you're right, my "statement" was too simple.

the pc is not mine, that's right, but my work is. so everything on the PC 
that resulted
from my actions is under my responsibility.

As a result, if someone needs to watch my work, then it should be done for
good reasons and I should be informed. and in general, all the reasons are bad
(excluding special situations such as when your coworkers have to access
your work and the like).

PS. When I say that, I personally have nothing to hide (nor does my monkey:).
but "principles are principles" in the same manner that the "law is the law".

cheers,
mouss

At 10:24 20/09/00 -0700, [EMAIL PROTECTED] wrote:

>The example below is very hard to maintain if one has an IT department 
>that is in charge of routinely updating corporate software or auditing 
>computers to ensure compliance to an organization's software 
>agreements/licensing.
>
>I had at one time customized a secure installation of NT with all the 
>tools that I often use, but when it came time to install a corporate 
>application, the application wouldn't install because it was dependent on 
>a .dll I removed.  The .dll was not used by any other application I had 
>installed, but this this application required it to be present.. It was 
>pain to re-install the .dll as in I had to install a whole bunch of other 
>useful .dlls to get the one I needed for this overly useless app.
>
>I was informed later, that consultants were not to customize their 
>installations of any particular operating system since it increases IT's 
>support responsibility because they are used to assigning machines to 
>consultants that were installed from the factory.  I keep on shaking my 
>head on how that company actually does anything useful.. :)
>
>/mark

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to