der attacks and outsider attacks. A system that is known to be (72) to an outsider attack by preventing (73) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (74) users. Detecting s
d or requestdata from legacy or external applications including databases.All replies,once converted into (67) mark-up language,can then be transmitted to a (68) .Used in this way,Intranets can (69) lower desktop support cost