I’ve got so many, I can’t remember. (How many ways can you spell “password”?)
Actually, with the widespread hacking, we need something a little more secure. And, to be practical, that has to be some way of identifying me as a legitimate user, but allowing me to delegate that authority to someone else, should I need to.
And, where are the system administrators that should be watching their servers? It would seem simple monitoring tools should show up activities that are not legitimate.
Side note: The follow-up replies via email still are not working.
Saturday 12-2 PM Eastern585-966-5299 or 1-800-790-0415Or text us at 585-209-9010And listen live on Jazz 90.1!or watch us on our very own YouTube channel!
Or, of course:
Hey, Google! Play Jazz 90.1
Alexa: Play Jazz 90.1
Enjoy Sound Bytes? Please help keep this site alive!