Allen S. Rout wrote:
>
> I'll echo "use the CAD". It is straightforward.
Too bad most TSM client security vulnerabilities have been in the CAD
(notably, the remotely-exploitable ones)...
--
Hello World. David Bronder - Systems Admin
Segmentation Fault ITS-EI, Univ. of Iowa
Core dumped, disk trashed, quota filled, soda warm. david-bronder AT uiowa
DOT edu
|