> Encrypt your hard disk.
Hoping that the encryption you use has no backdoor.
> Choose a *very* good password.
For the encryption, I suppose. That once one has his hands on the
hardware there is no user/prom/bios password stopping his intrusion.
> Unless they are a honey trap - and then you can see what is actually
> trying to break into your network
Honey trap are honey trap, not unguarded computers - I mean computer
people use without care for security.
--
/\ ___ Ubuntu: ancient
/___/\_|_|\_|__|___Gian Uberto Lauri_____ African word
//--\| | \| | Integralista GNUslamico meaning "I can
\/ coltivatore diretto di software not install
giĆ sistemista a tempo (altrui) perso... Debian"
Warning: gnome-config-daemon considered more dangerous than GOTO
--
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]
Archive: http://lists.debian.org/[email protected]