|
Rob, this is a problem? <vbg> Actually, during my sojourn at a certain large computer maker, somewhere between green and indigo in the rainbow, this kind of scheme was not unheard of. Especially in regard to DST users and passwords - how many times do you disable QSECOFR's DST profile when half a dozen folks can use it? Of course, the systems in question were on totally private nteworks, locked in subbasements, access controlled by security badges, and it was understood what could and could not be done. Regards Vern At 01:24 PM 10/28/02 -0500, you wrote:
This is a multipart message in MIME format. -- [ Picked text/plain from multipart/alternative ] We had a 'former' systems employee who wrote a routine on his PC. Everytime his password reached the expiration interval, it would change it 32 times, back to the original. Another who used his user id and tacked two numbers on it XYZ01, XYZ02, XYZ03 - just kept rotating it every time it expired. Crud like this is why IBM has all those password rules available to make sure that letters are different in each position, and stuff like that. Rob Berendt --
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.