
     " .... One of the most serious difficulties encountered
in the use of WCS is the control of undesired access to the memory.
Unless care is taken to limit user access key has been 
provided to Pandora's box. Many technical articles have waxed long
and elegant on the dangers which failed to materialize in fact. However,
some danger does exist which can be best controlled by having well 
defined policies, and possibly denying user access to certain points in
the system.
 
          CERTAINLY, UNCONTROLLED CREATIVE IMPROVEMENTS TO
          PROPERLY FUNCTIONING SYSTEMS CAN PRESENT THE 
          SERVICE ENGINEER WITH AN OPPORTUNITY TO SOLVE
          PROBLEMS OF SIGNIFICANT MAGNITUDE.
                                                 .... "
 
 
 
@