This article is from the Scouting FAQ, by Bill Nelson email@example.com, Soaring Golden Eagle firstname.lastname@example.org and Alan Houser email@example.com with numerous contributions by others.
Date: Mon, 13 Mar 1995
From: Alan Houser <firstname.lastname@example.org>
Unless you are a professional in the computer sciences field, this
subject is probably more complex than you can imagine. Discuss security
arrangements with your system operator or service provider, then FOLLOW