Hi, since there are abviously some poeple good at security on this list, I'd like to ask, if they could point me to some good literature (preferred online), about implementing security methods, or more specific, user authentication. Since we are in the process of developing a completely new Goods-Management-System (dunno what it's really called in English, the software that runs in outlets, connected to a database, managing all the sales of goods), I am expected to present some model on how user authentication should look like. At the moment there is no security at all, and we have problems, because the wrong poeple do wrong things in databases (developers ;)). Lars ---------------------------------------------- Lars Oeschey - Media Saturn GFI IT Security visit The C.O.R.E. @ http://www.the-core.net --------------------------------------------------------------------- To unsubscribe, send a message with the line: unsubscribe vnc-list to [EMAIL PROTECTED] See also: http://www.uk.research.att.com/vnc/intouch.html ---------------------------------------------------------------------