lists abuse jack-goat
"Consider server and client migration tools with the perception that someone can always enter their data with no earlier accrued login credentials. This creates an environment of risk towards the circular routing model, effectively closing any gains from outside of the environment and inhibiting a more relaxed authentication hemisphere. Eventually this can lead to an explosion of the network layer firewalls and reluctance from a public terminal access point, often resulting in a particular services exchange above and beyond the executive decision layer. Deciding what the next course of action is after this intrusion is highly dependant on the variety of cabling twisted into the guidance system. Repurcussions from any malpractice from an organisational level often involve local law enforcement authority and frequently result in a localised form of configuration trimming."