On Wed, 06 May 2009 15:43:37 -0500, JB2 wrote:
On 06 May 09, Jim Henderson wrote:
On Wed, 06 May 2009 08:43:32 -0500, L. V. Lammert wrote:
Sorry, your assumptions are wrong on boht counts. A *USER* should not be put in a position of knowing what is secure or not - that is just good security practice.
It's not a question of the user being put in that position, it's (as Prasun points out) a question of the user knowing they launched an application and that application needs access to resources external to the machine.
Then they need to leaqrn who to ask to set it up if the application is going to complicate things that way.
This statement makes no sense to me.
"Control" means knowing and caring what the heck one is doing with that control.
I don't disagree iwth that.
That assertion is a false assertion, easily provable by me introducing the example of my mother, who I have trained to not just agree to anything the computer asks her.
Yay for her. One of the extremely few who actually listen...or does she? You say you've trained her, but you don't actually know she follows those rules 100% of the time, unless you're standing there 100% of the time to watch her.
Either way, my 49 (my mom uses Linux, so she doesn't count) trumps your 1.
I'll raise you a fortune 50 company with over a quarter of a million employees that I worked for, if you're interested in one-upmanship. But that doesn't really help the discussion now, does it? Jim -- Jim Henderson Please keep on-topic replies on the list so everyone benefits -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org For additional commands, e-mail: opensuse+help@opensuse.org