Steve Erbach
erbachs at gmail.com
Mon Jan 17 11:22:21 CST 2005
Gustav, >> If your system is secured by login and authentication, the userid and a timestamp should be all that is needed. << And there's the rub. This application uses SQL authentication, not Windows authentication. Thus anyone can log in from any browser anywhere using one of the valid user IDs and passwords. That's where my curiosity about gathering workstation-specific information came from: to construct a profile of the w/s that did the modifying. Steve Erbach Neenah, WI On Sun, 16 Jan 2005 22:12:44 +0100, Gustav Brock <Gustav at cactus.dk> wrote: > Hi Steve > > You can save all kinds of info but the question must be when and how > you would use it later and if you will be able to track it down if > needed - not very likely. In my opinion hardware type of info is useful > only for debugging errors. > > If your system is secured by login and authentication, the userid and a > timestamp should be all that is needed. > > /gustav >