• One of the other possible security problems is with the janitorial and repair staff. They have the keys and RFIDs to get just about anywhere. They might not be able to get into the server room but they sure can visit your desk. They don't even need to stop what they're doing if they have a good enough memory. 24/7 video monitoring won't be enough for them to pickup what they need for a hack or whatever. Even if they need to linger, who's to say that they haven't enlisted the person watching the tubes? Locked desk drawers don't make it either. It takes someone with the right tool about the same amount of time to open a locked desk as it does as someone with the correct key.

    Of course, wireless transmitters can be easily hidden just about anywhere. Normally people don't need to go that far though. The supposedly secure wireless transmitters in the building do just fine. 🙂

    --Jeff Moden


    RBAR is pronounced "ree-bar" and is a "Modenism" for Row-By-Agonizing-Row.
    First step towards the paradigm shift of writing Set Based code:
    ________Stop thinking about what you want to do to a ROW... think, instead, of what you want to do to a COLUMN.

    Change is inevitable... Change for the better is not.


    Helpful Links:
    How to post code problems
    How to Post Performance Problems
    Create a Tally Function (fnTally)