Alle 14:47, lunedì 8 marzo 2004, Bruno Wolff III ha scritto:
> > Accordingly to law, a "authorized operator". A piece of paper transforms
> > a generic user/sysadmin into a trusted person who can perform such
> > operations (again, not our choice: law imposes it).
>
> This sounds like the real solution to your problem. You should do what
> you need to to make the system administrator an authorized user and
> then use more practical security methods to secure the data.
I'm going to think very carefully over this possibility... ;-)
-----------------------------------------
Alessandro Bottoni and Silvana Di Martino
alessandrobottoni@interfree.it
silvanadimartino@tin.it