> Traditional IT does that by constructing fool-proof procedures.
> That's very, very difficult, because fools are so ingenious.  ;-)

I think we have all worked on the never-ending projects that involved
making the applications "user-proof". It is simply not possible....

saqib
http://kawphi.blogspot.com

_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to