[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference gidday::sites_at_risk

Title:Environments with loopholes
Moderator:GIDDAY::GILLINGS
Created:Thu Mar 23 1989
Last Modified:Sat Dec 14 1996
Last Successful Update:Fri Jun 06 1997
Number of topics:47
Total number of notes:196

8.0. "Risks of BACKUP Procedures" by HANNAH::LEICHTERJ (Jerry Leichter) Fri Mar 24 1989 16:54

T.RTitleUserPersonal
Name
DateLines
8.1Reel to reel...CADSYS::DIPACEAlice DiPaceFri Mar 24 1989 18:0019
8.2PASTIS::MONAHANhumanity is a trojan horseFri Mar 24 1989 23:243
8.3Who are you. really?DWOVAX::YOUNGSharing is what Digital does best.Sat Mar 25 1989 04:507
8.4DWOVAX::YOUNGSharing is what Digital does best.Sat Mar 25 1989 04:5410
8.5SOGW protection requires /OWNER=ORIGINALDDIF::CANTORThis is not all rock and roll, dude.Sat Mar 25 1989 08:0420
8.6HANNAH::LEICHTERJJerry LeichterSat Mar 25 1989 15:1831
8.7Links to inaccessible files can be createdDDIF::CANTORThis is not all rock and roll, dude.Sun Mar 26 1989 05:528
8.8VISA::MONAHANhumanity is a trojan horseTue Mar 28 1989 02:473
8.9They'll get you too...WELMTS::HILLTechnology is my Vorpal swordWed May 17 1989 03:2515
8.10ATPS::BLOTCKYThu Jul 12 1990 12:3710