in reply to Data Security in Perl
But if you want to do this useless thing, then use the sudo utility (which needs to be configured) to allow the modification script to run as root. Then you can have the trappings of security, if none of the substance. (Figuring out how to set up https will go a long way towards fixing that.)
|
---|
Replies are listed 'Best First'. | |
---|---|
Re: Re: Data Security in Perl
by Anonymous Monk on Sep 04, 2002 at 11:45 UTC |