The following is the ITKnowledge Exchange Tip of the Week for Sept. 27, 2004.
"GPHdo6" of Arkansas BlueCross BlueShield writes:
What should a network user ID look like for strong security? I don't believe it should contain any part of the user's legal name. Agree? So what do you use to create a user ID? Should users be able to change their user IDs?
Start your own discussion
Do you you have a Windows security dilemma that needs quick attention? Talk about it in ITKE.
About the ITKnowledge Exchange
ITKnowledge Exchange is a place where IT pros can share ideas, expertise and get answers to their technical and strategic questions. It provides direct access between groups or individuals who are grappling with similar IT issues in a safe and seamless environment. Click to start participating today or go to the Tip of the Week archives.