Path: utzoo!attcan!uunet!ginosko!gem.mps.ohio-state.edu!uwm.edu!ux1.cso.uiuc.edu!uxc.cso.uiuc.edu!uxc.cso.uiuc.edu!m.cs.uiuc.edu!estell
From: estell@m.cs.uiuc.edu
Newsgroups: comp.sys.apple
Subject: Re: mouce security.
Message-ID: <7300020@m.cs.uiuc.edu>
Date: 30 Sep 89 23:20:29 GMT
Lines: 4
Nf-ID: #R:<8909291639.aa08421@SMOKE.BRL.MI:-34:m.cs.uiuc.edu:7300020:000:225
Nf-From: m.cs.uiuc.edu!estell    Sep 29 21:23:00 1989


Perhaps you would be better off by having the mouses left off the computers
when not in use.  When a student needs to use a computer, a mouse can be
checked out under that person's name, which makes it rather hard to steal.