http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1017955,00.html You have used POP Mail--the protocol that allows single user hosts to read mail from a server--for giving certificates to e-mail users. In what circumstances is this appropriate?
"Todd Sanders: It is appropriate in all circumstances, due to the security implications behind it. We feel that, in security, the most important aspect of IT is the end user and/or the client. ............. _______________________________________________ LUG mailing list [EMAIL PROTECTED] http://kym.net/mailman/listinfo/lug %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
