Robert G. Brown wrote:
Also to be remembered is that in most situations where one user exploits
another's account or takes another's data INSIDE an organization, the
best security tool is known as a "sucker rod". Or a hammer. Applied,
none too gently, to a user's fingers or the side of their he
You are right, of course. This also explains why all laptops have metal lining
behind their funky (or not) plastic cases.
In my experience of running with cases open, no case at all, or even using a
cardboard boot box as a case (yep, a student brought that in once :D) , the
worst interference