From: AZ Nomad on
On Thu, 07 Jan 2010 09:01:19 +0000, The Natural Philosopher <tnp(a)invalid.invalid> wrote:
>John Hasler wrote:
>> AZ Nomad writes:
>>> If you don't have physical security then you have no security at all.
>>> You're deluding yourself if you think a little epoxy provides any real
>>> security.
>>
>> The epoxy is quite enough to prevent the users from sticking their
>> sticks in. The point is to prevent authorized users from doing stupid
>> things, not prevent black-bag jobs.
>>
>>> Pop the cover. Pull the hard drive, and image it. If necessary,
>>> return with copy on laptop to pull all the data you want from the
>>> network.
>>
>> But first get past the armed guards.
>I wish people would realise there is no such thing as 'security'

>There is more secure, and there is less secure. there is no 'secure'

inconvenience != security
From: Greegor on
ML > One of the easy ways to hack into a computer facility is to drop
ML > infected USB drives in the parking lot. A lot of people will pick
them
ML > up and plug them in to see what's on the drive.

I know I shouldn't laugh, but I just couldn't help it!
From: J G Miller on
On Thu, 14 Jan 2010 01:38:51 -0800, Greegor wrote:

> I know I shouldn't laugh, but I just couldn't help it!

Well security on Micro$loth windoze systems is rather a laugh, is it not?

If the USB key was plugged into a BSD or GNU/Linux system and then
examined with the usual tools, without any HAL automounting and clever
script to automagically run any .autorun files present through WINE, no
infection would result would it?
From: The Natural Philosopher on
J G Miller wrote:
> On Thu, 14 Jan 2010 01:38:51 -0800, Greegor wrote:
>
>> I know I shouldn't laugh, but I just couldn't help it!
>
> Well security on Micro$loth windoze systems is rather a laugh, is it not?
>
> If the USB key was plugged into a BSD or GNU/Linux system and then
> examined with the usual tools, without any HAL automounting and clever
> script to automagically run any .autorun files present through WINE, no
> infection would result would it?

why would one ever run automount and WINE anyway?

From: jellybean stonerfish on
On Thu, 14 Jan 2010 15:10:57 +0000, The Natural Philosopher wrote:

> J G Miller wrote:
>> On Thu, 14 Jan 2010 01:38:51 -0800, Greegor wrote:
>>
>>> I know I shouldn't laugh, but I just couldn't help it!
>>
>> Well security on Micro$loth windoze systems is rather a laugh, is it
>> not?
>>
>> If the USB key was plugged into a BSD or GNU/Linux system and then
>> examined with the usual tools, without any HAL automounting and clever
>> script to automagically run any .autorun files present through WINE, no
>> infection would result would it?
>
> why would one ever run automount and WINE anyway?

To be more like windows.