Path: utzoo!attcan!uunet!ginosko!gem.mps.ohio-state.edu!uwm.edu!ux1.cso.uiuc.edu!uxc.cso.uiuc.edu!uxc.cso.uiuc.edu!m.cs.uiuc.edu!estell From: estell@m.cs.uiuc.edu Newsgroups: comp.sys.apple Subject: Re: mouce security. Message-ID: <7300020@m.cs.uiuc.edu> Date: 30 Sep 89 23:20:29 GMT Lines: 4 Nf-ID: #R:<8909291639.aa08421@SMOKE.BRL.MI:-34:m.cs.uiuc.edu:7300020:000:225 Nf-From: m.cs.uiuc.edu!estell Sep 29 21:23:00 1989 Perhaps you would be better off by having the mouses left off the computers when not in use. When a student needs to use a computer, a mouse can be checked out under that person's name, which makes it rather hard to steal.