Because, I don't know about you, but I am paranoid. What happens if instead of putting security on a device, IBM put backdoors or keyloggers or whatever on them? Not saying that IBm would, but I get suspicious with this type of thing.
Nimer J The Elf wrote:
-- Nimer M. Jaber The information transmitted is intended only for the person or entity to which it is addressed and may contain confidential and/or privileged material. Any review, retransmission, dissemination or other use of, or taking of any action in reliance upon this information by persons or entities other than the intended recipient is prohibited. If you received this in error, please contact the sender via reply e-mail, and delete the material from any computer. Website: http://www.empowertheblind.org Phone: (720) (251-4530) blind_html To unsubscribe, please send a blank email to blind_html-request@xxxxxxxxxxxxx with unsubscribe in the subject line. To access the archives, please visit: http://www.freelists.org/archive/blind_html Thanks