Prev: Re (3): HOW2 make an objectified bash script ?
Next: Deja Vu: Swap Ctrl/Caps Lock, only this time Knoppix 6.2
From: AZ Nomad on 7 Jan 2010 09:47 On Thu, 07 Jan 2010 09:01:19 +0000, The Natural Philosopher <tnp(a)invalid.invalid> wrote: >John Hasler wrote: >> AZ Nomad writes: >>> If you don't have physical security then you have no security at all. >>> You're deluding yourself if you think a little epoxy provides any real >>> security. >> >> The epoxy is quite enough to prevent the users from sticking their >> sticks in. The point is to prevent authorized users from doing stupid >> things, not prevent black-bag jobs. >> >>> Pop the cover. Pull the hard drive, and image it. If necessary, >>> return with copy on laptop to pull all the data you want from the >>> network. >> >> But first get past the armed guards. >I wish people would realise there is no such thing as 'security' >There is more secure, and there is less secure. there is no 'secure' inconvenience != security
From: Greegor on 14 Jan 2010 04:38 ML > One of the easy ways to hack into a computer facility is to drop ML > infected USB drives in the parking lot. A lot of people will pick them ML > up and plug them in to see what's on the drive. I know I shouldn't laugh, but I just couldn't help it!
From: J G Miller on 14 Jan 2010 09:57 On Thu, 14 Jan 2010 01:38:51 -0800, Greegor wrote: > I know I shouldn't laugh, but I just couldn't help it! Well security on Micro$loth windoze systems is rather a laugh, is it not? If the USB key was plugged into a BSD or GNU/Linux system and then examined with the usual tools, without any HAL automounting and clever script to automagically run any .autorun files present through WINE, no infection would result would it?
From: The Natural Philosopher on 14 Jan 2010 10:10 J G Miller wrote: > On Thu, 14 Jan 2010 01:38:51 -0800, Greegor wrote: > >> I know I shouldn't laugh, but I just couldn't help it! > > Well security on Micro$loth windoze systems is rather a laugh, is it not? > > If the USB key was plugged into a BSD or GNU/Linux system and then > examined with the usual tools, without any HAL automounting and clever > script to automagically run any .autorun files present through WINE, no > infection would result would it? why would one ever run automount and WINE anyway?
From: jellybean stonerfish on 14 Jan 2010 11:04 On Thu, 14 Jan 2010 15:10:57 +0000, The Natural Philosopher wrote: > J G Miller wrote: >> On Thu, 14 Jan 2010 01:38:51 -0800, Greegor wrote: >> >>> I know I shouldn't laugh, but I just couldn't help it! >> >> Well security on Micro$loth windoze systems is rather a laugh, is it >> not? >> >> If the USB key was plugged into a BSD or GNU/Linux system and then >> examined with the usual tools, without any HAL automounting and clever >> script to automagically run any .autorun files present through WINE, no >> infection would result would it? > > why would one ever run automount and WINE anyway? To be more like windows.
First
|
Prev
|
Next
|
Last
Pages: 1 2 3 4 Prev: Re (3): HOW2 make an objectified bash script ? Next: Deja Vu: Swap Ctrl/Caps Lock, only this time Knoppix 6.2 |