It can be effective, but it can't be *counted on* to be effective.

Jon



<snip>
Low - rely on the probability that the Windows admin will never find/look
for the key file in the file system (security through obscurity can be
very effective :))
</snip>

----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390

Reply via email to