On Sun, 16 Nov 2003, Arnt Karlsen wrote:

..
> >     - i watch where the finger goes before i sign
> >     the dotted lines and look for them checks
> >     and lots of checklist items too of what's oka
> >     and whats not acceptable ..
> 
> ..I'm not talking trivial bootloader code, I'm talking theft, abuse, 
> and sabotage of "your clients business data".  And it may be 
> sneaked in, to help let them keep track of backed up data.
> 
> ..be _creatively_ paranoid, if you wanna try stay ahead of this shit.


exactly... and the more super paranoid .. the better one might
be at the job of making sure data is not lost/stolen

easiest way for people to lose data:
        - allow dhcp -- you dont know who plugged in when/where/how

        - allowing insecure wireless access... geez .. :-) amazing ..

        - allowing laptops -- you dont know what virus they're bringing in
        from home to work .. ( nobody realy works from home if they have a
        9-5 ... its just a gadget some people like to carry around to look
        important??
                - trivially verified by time stamps of last file accesses
                and changes

        - stolen laptops  ( ie ... i lost it but in reality, it became
        neighbors xmas present )
                - its amazing to watch how easily and how often people
                can get new laptops at work

                - expensive things do tend to grow leggs, faster than
                you can blink

        - improper/unchecked backups .. or if they have it, backups
        on the same disk is such a moronic thing to do, its not funny
        when they dont get it ..
                - pull the disk out for a "smulated crashed disk"
                ( than they might see the light ... okay, go buy a new
                  $300 backup pc for me(the company) )

                - if the data is not worth $300 ... time to find other
                potential clients

c ya
alvin

- think i'll be trying out encrypted root file systems next ...
  and than if it works .. than encrypt data files too as day-to-day norm
        - than go knocking on the doors of them folks we're not supposed
        to know about


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to