logo

New Response

« Return to the blog entry

You are replying to:

    • avatar
    • Ferdy
    • Posted on Wed 24 Sep 2008 08:32 AM

    Jake,

    I can confirm what Mats is saying, this does work. To me it looks like the best, less obscure method of detecting such attacks. Notice how it is the same advise I gave you a few weeks back concerning the orchestration of two agents that needed shared access to the same doc.

    regards,

    Ferdy

Your Comments

Name:
E-mail:
(optional)
Website:
(optional)
Comment: