Viewing 2 posts - 1 through 2 (of 2 total)
This is scare mongering. Exactly how is a "breach" detected? A system sophisticated enough to be able to detect illegitimate access is most likely set up properly to prevent it....
February 16, 2011 at 7:42 pm
#1288021
Fair enough, I learned something myself. But if someone is just looking for the functionality provided the two-step method is the way to go.
April 29, 2010 at 6:14 pm
#1160110