Unfortunately, some places do use the user1, user2 approach of sharing one user 
ID amopng many same-type users. I try to educate the Admin that all audits and 
activity logs are useless that way as you cannot pin any activity on a user. 
The response usually reflects how relevant (or not) this is to the organization.

Henry

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Pete Theisen
Sent: 2008-05-05 11:02 AM
To: [EMAIL PROTECTED]
Subject: Re: Program Key


On Monday 05 May 2008 08:42, [EMAIL PROTECTED] wrote:
> I use keys that include the client's name. This way, the keys 'brand' the
> software for the one client and are useless to pass around.

Hi Henry!

How do you deal with the offices that pass around the login name as well? I 
have worked in places like that.
-- 
Regards,

Pete
http://www.pete-theisen.com/


[excessive quoting removed by server]

_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://leafe.com/mailman/listinfo/profox
OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message: http://leafe.com/archives/byMID/profox/[EMAIL PROTECTED]
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to