Hi,

since there are abviously some poeple good at security on this list, I'd
like to ask, if they could point me to some good literature (preferred
online), about implementing security methods, or more specific, user
authentication.
Since we are in the process of developing a completely new
Goods-Management-System (dunno what it's really called in English, the
software that runs in outlets, connected to a database, managing all the
sales of goods), I am expected to present some model on how user
authentication should look like. At the moment there is no security at all,
and we have problems, because the wrong poeple do wrong things in databases
(developers ;)).

Lars

----------------------------------------------
Lars Oeschey - Media Saturn GFI
IT Security
visit The C.O.R.E. @ http://www.the-core.net 
---------------------------------------------------------------------
To unsubscribe, send a message with the line: unsubscribe vnc-list
to [EMAIL PROTECTED]
See also: http://www.uk.research.att.com/vnc/intouch.html
---------------------------------------------------------------------

Reply via email to