Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Posting-Version: Notesfiles $Revision: 1.6.2.17 $; site uokvax.UUCP Path: utzoo!watmath!clyde!cbosgd!ihnp4!inuxc!pur-ee!uiucdcs!uokvax!emks From: emks@uokvax.UUCP Newsgroups: net.unix-wizards Subject: Re: Unix (In)Security Message-ID: <6200033@uokvax.UUCP> Date: Sun, 2-Dec-84 14:48:00 EST Article-I.D.: uokvax.6200033 Posted: Sun Dec 2 14:48:00 1984 Date-Received: Thu, 6-Dec-84 03:48:53 EST References: <141@sask.UUCP> Lines: 12 Nf-ID: #R:sask:-14100:uokvax:6200033:37777777600:447 Nf-From: uokvax!emks Dec 2 13:48:00 1984 /***** uokvax:net.unix-wizar / sask!derek / 7:47 pm Nov 30, 1984 */ Are there any flaws which have no way to be plugged? /* ---------- */ Well, I don't know about "no way" to be plugged, but certainly the human factor is one of the most notorious ways in which security is breached. (I.e. Users telling other users about their passwords, overhearing the super-user account password, or disgruntled employees who have special access). kurt