Unfortunately, so much of computer security is exactly this way. If the asset is of significant value, the bad guys won't fight fair (they'll fight bits with bats).
1 comment:
Anonymous
said...
a chain is only as strong as its weakest link, and in this case the user is the weakest one
1 comment:
a chain is only as strong as its weakest link, and in this case the user is the weakest one
Post a Comment