Anti-pokerites believe in something that is obviously untrue (the non-existence of two pair). I'm not saying you believe in this, but this turns out to be the only consistent stance that anti-pokerites fall into when they start talking about the after-round. They do this to avoid the unavoidable consequence that based on the fact that two pair exist, and didn't exist before the hand was dealt, the evidence is actually on the side of pokerites of various stripes that two pair exist again after the round.
Why can't the "self" be a transient pattern, like "two pair" in poker?
Older models, such as the DI-524, require authentication for all of the supported SOAP actions, but allow both the administrator and user accounts to execute any of these actions. This allows a malicious individual to use the often-ignored user account (default login of 'user' with a blank password) to perform administrative actions
If I read that right I should be fine as long as I secure the user account as well as the admin account. (And, of course, disable remote access.) Can anybody confirm/correct? Thanks.
The moon is made of green cheese. -- John Heywood