From “Authentication is Secondary” by Bob Cringely:
“Remember that all the authentication in the world will not protect against a privileged user doing the wrong thing. It’s just that logging may help to determine what happened after the fact.”
From “Authentication is Secondary” by Bob Cringely:
“Remember that all the authentication in the world will not protect against a privileged user doing the wrong thing. It’s just that logging may help to determine what happened after the fact.”
This post was created on Droid phone using WordPress for Android. You can find more details about the app at http://android.wordpress.org/.