Loren Stafford wrote:
>
> Thanks, Steve.
>
> I have few questions below 8-) (I'm always better with questions than
> answers.)
>
> -- Loren
>
> From: "Steve Alexander" <[EMAIL PROTECTED]>
> > Hi Loren,
> >
> > > I'd be glad to listen to well considered proposals for how Xron should
> > >
Thanks, Steve.
I have few questions below 8-) (I'm always better with questions than
answers.)
-- Loren
From: "Steve Alexander" <[EMAIL PROTECTED]>
> Hi Loren,
>
> > I'd be glad to listen to well considered proposals for how Xron should
> > handle security.
>
> Consider this a "straw man".
Hi Loren,
> I'd be glad to listen to well considered proposals for how Xron should
> handle security.
Consider this a "straw man".
On installation, Xron creates a user in the root user folder called
"XronUser".
Xron is resonsible for setting this user's password. Therefore, it is
known to bot