http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1017955,00.html
You have used POP Mail--the protocol that allows single user hosts to
read mail from a server--for giving certificates to e-mail users. In
what circumstances is this appropriate?

"Todd Sanders: It is appropriate in all circumstances, due to the
security implications behind it. We feel that, in security, the most
important aspect of IT is the end user and/or the client. .............


_______________________________________________
LUG mailing list
[EMAIL PROTECTED]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

Reply via email to