don't even need to secure the config application
otherwise. Again,
this is discussed in the Deployment chapter of the Seaside book.
i think that was discussed in the past here:
http://book.seaside.st/book/advanced/deployment/deployment-preparing
but for whatever reason, i can't find it anywhere..
--
----
peace,
sergio
photographer, journalist, visionary
http://www.CodingForHire.com
http://www.coffee-black.com
http://www.painlessfrugality.com
http://www.twitter.com/sergio_101
http://www.facebook.com/sergio101