First page
Back
Continue
Last page
Overview
Graphics
Authenticated access
All this reliance on IP addresses is foolish
too restrictive
too lax
If we want to limit access to particular people then you have to identify the people