That's a pretty open question. One plausible answer, that probably
doesn't help much, is "It's less vulnerable than Internet Explorer."
Developing a more specific answer probably requires a little more
background on:
What do you want to do?
When?
In what environment?
Interacting in what ways with what other systems?
What are the figures of merit for success, by which one can
objectively assess threats at a system-success level?
On Feb 24, 2006, at 1:13 PM, Brady Alsaker wrote:
> Greetings,
>
> I am working as part of an IT Consulting group on the
> UMM campus, and before I can start working with
> Croquet they advised me to see how vulnerable it is to
> hacking and such.
>
> Does anyone have any information on this for me?
>
> Thank you very much!
>
> Brady
>
> __________________________________________________
> Do You Yahoo!?
> Tired of spam? Yahoo! Mail has the best spam protection around
>
http://mail.yahoo.com>