Talk:Information security
Jump to navigation
Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
My choice of terms may not be entirely standard for the IT industry, but I think I've covered most of the basic issues. --Ted C 08:52, 22 February 2008 (EST)
With regard to VOY "Investigations", is there good reason to believe that Neelix should not have had access to that terminal? Federation computers use voice recognition to identify users, so there's no reason he shouldn't be able to open a terminal by voice command, unless that terminal has other restrictions. --Ted C 11:26, 19 February 2013 (EST)