Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Posting-Version: Notesfiles $Revision: 1.6.2.17 $; site uokvax.UUCP
Path: utzoo!watmath!clyde!cbosgd!ihnp4!inuxc!pur-ee!uiucdcs!uokvax!emks
From: emks@uokvax.UUCP
Newsgroups: net.unix-wizards
Subject: Re: Unix (In)Security
Message-ID: <6200033@uokvax.UUCP>
Date: Sun, 2-Dec-84 14:48:00 EST
Article-I.D.: uokvax.6200033
Posted: Sun Dec  2 14:48:00 1984
Date-Received: Thu, 6-Dec-84 03:48:53 EST
References: <141@sask.UUCP>
Lines: 12
Nf-ID: #R:sask:-14100:uokvax:6200033:37777777600:447
Nf-From: uokvax!emks    Dec  2 13:48:00 1984

/***** uokvax:net.unix-wizar / sask!derek /  7:47 pm  Nov 30, 1984 */
Are there any flaws which have no way to be plugged?
/* ---------- */

Well, I don't know about "no way" to be plugged, but certainly the human
factor is one of the most notorious ways in which security is breached.
(I.e. Users telling other users about their passwords, overhearing the
super-user account password, or disgruntled employees who have special
access).

		kurt