This article is from the Scouting FAQ, by Bill Nelson nelsonb@nospam.aztec.asu.edu, Soaring Golden Eagle eagle@rangernet.org and Alan Houser troop24@emf.net with numerous contributions by others.
Date: Mon, 13 Mar 1995
From: Alan Houser <troop24@emf.net>
Unless you are a professional in the computer sciences field, this
subject is probably more complex than you can imagine. Discuss security
arrangements with your system operator or service provider, then FOLLOW
THEIR INSTRUCTIONS.
 
Continue to: