Archives of the TeradataForum
Message Posted: Thu, 04 Mar 2004 @ 13:00:48 GMT
Agreed. But from a security point of view, if you (or the network people) can't track down who's attempting to access the system, then any claim to having a secure system is just pure fiction.
|Copyright 2016 - All Rights Reserved|
|Last Modified: 27 Dec 2016|