djsfantasi
- Joined Apr 11, 2010
- 9,163
We used a scheme for system access that one could only access the system from THEIR laptop (something they have) and with THEIR password (something they know. And it was different than their laptop password).
One of the biggest problems is that most people don't know.something they know[
by Jake Hertz
by Aaron Carman
by Aaron Carman