Anybody know anything about two factor authentication? What if I gave a token to the neighbor kid and told him to take it to my Aunt Millie across town. An hour later Aunt Millie calls me on our ultra-secure encrypted point to point telephone line to say that she has it. So I open my control panel and synchronize the server with her token, and then set her a PIN.
Was having the token out of my control for that hour a security consideration? -todd -- [email protected] http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list
