" .... One of the most serious difficulties encountered in the use of WCS is the control of undesired access to the memory. Unless care is taken to limit user access key has been provided to Pandora's box. Many technical articles have waxed long and elegant on the dangers which failed to materialize in fact. However, some danger does exist which can be best controlled by having well defined policies, and possibly denying user access to certain points in the system. CERTAINLY, UNCONTROLLED CREATIVE IMPROVEMENTS TO PROPERLY FUNCTIONING SYSTEMS CAN PRESENT THE SERVICE ENGINEER WITH AN OPPORTUNITY TO SOLVE PROBLEMS OF SIGNIFICANT MAGNITUDE. .... " @