This week's book giveaway is in the Mac OS forum. We're giving away four copies of a choice of "Take Control of Upgrading to Yosemite" or "Take Control of Automating Your Mac" and have Joe Kissell on-line! See this thread for details.
What happens in this case : One of the <security-constraint> elements has no <auth-constraint> element and it combines with an empty <auth-constraint> tag inside <security-constraint>...is the access to the common constrained resource allowed to everybody or to nobody? I think it's nobody...but it's always better to confirm?