Hi everyone,
Just spotted an interesting (and slightly worrying!) article on www.slashdot.org:
http://ask.slashdot.org/askslashdot/03/08/07/2243214.shtml
Although the article fails to name the software product in question, a lot of the replies seem to assume that it's a product not a million miles off topic to this mailing list.
It does raise an interesting question though... What if a student at your institution found a similar method of exploiting your VLE? Do you have checks in place to catch a student training to access areas of the VLE that they shouldn't be accessing? Would there be enough checks in place to catch any changes they made and to restore the pre-tampered data? What would your response be if the student came forward with the information?
Food for thought!
Dave Pattern
INHALE/INFORMS Project Web Developer - http://informs.hud.ac.uk
University of Huddersfield
|