>The typical concern is that an unprivileged user may be able to persuade a privileged user (e.g. some STC) to access data the unprivileged user was not otherwise entitled to and/or to disclose that data to some third party.
Now we're getting into the deliberate (read: malicious), rather than accidental access. Social Engineering. "Grounds for discipline, up to (and including) dismissal!" - -teD I’m an enthusiastic proselytiser of the universal panacea I believe in! ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

