|
on 01/18/98at 02:22 PM, our friend Carl Galgano <cgalgano@ediconsulting.com> said: >Actually, only the passwords are encrypted in an SNA transaction, but >that is generally all you need. >Carl I still wonder where the real risk lies. Electrons racing down a phone line are hard to catch, hard to put together in the right order, and hard to determine which is good and which is trash. If a bad guy wanted your password, would he sniff your phone lines? Probably that would be his last choice. I am not against internet security plans and programs, but when I see the actual security lapses that happen in offices everywhere, I tend to worry a bit less over T1 telephone lines. ---------------------------------------------------- Booth Martin --------------------------------------------------- +--- | This is the Midrange System Mailing List! | To submit a new message, send your mail to "MIDRANGE-L@midrange.com". | To unsubscribe from this list send email to MIDRANGE-L-UNSUB@midrange.com. | Questions should be directed to the list owner/operator: david@midrange.com +---
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.