Thread: Hacker
View Single Post
  #95  
Old 09-02-2007, 07:49 AM
froglok23's Avatar
froglok23
Hill Giant
 
Join Date: May 2005
Location: Australia
Posts: 113
Default

Quote:
With a good log system, we can prune out anyone who doesn't follow protocol, and with a good back up system we wouldn't loose much if someone screwed up.
This could be done with #DEFINE EQEMUDBEDITOMODE with the source, to allow full loggin for database editors and such.

Very much doable indeed!

- froglok