Quote History Quoted:
When you can override the security by just changing the file extension, is it really worth the hassle?
View Quote View All Quotes
View All Quotes
Quote History Quoted:
Quoted:
Quoted:
Quoted:
Brought to you by the same geniuses who developed Windoze 8?
End user problems predate Win8.
Yeah, I could re-write the OP more accurately as:
"Why do e-mail server and security admins have and follow best practices? I want to do stupid stuff and they won't let me!"
When you can override the security by just changing the file extension, is it really worth the hassle?
Properly configured you would have to *want* to over-ride the security and commit and overt and intentional act to do so. The act alone would be enough for termination or, in some cases, prosecution. Further, properly configured best practices won't allow your intentional circumvention to actually damage the framework and infrastructure.
If I'm a trusted party on a network I *can* do a lot of things to hurt it if I'm acting intentionally. Most security practices aren't built to answer those kinds of threats.
No network can remain usable and impervious to a determined attacker. Period.