[<prev] [next>] [day] [month] [year] [list]
Message-ID: <9cf6589e0409130950240331f9@mail.gmail.com>
From: lists.inbox at gmail.com (lists.inbox)
Subject: Where is the sec ind gng?
Example:
This new cpu-geek-coffy shop/ bar down the street has 36 brand
spanking new 3ghz 512m ram ddr 400hz...
all connected to high speed for games and whatnot...
1rst week point, the boxes are right in front of you on the desk, with
cdroms working and all, floppies working, cases unlocked...
2nd, bios isnt password protected, (boot from cd...aka any live linux
distro and its over, you can do a number of things, the less serious
ones include sniffing the network for the admin passes to "game
interface" that decides how much time you have left)
But...oh yea....this is why u sould never have a case unlocked in
front of someone u dont know... ... anybody need some ram? ... lol
On Mon, 13 Sep 2004 08:59:34 -0700 (PDT), Harlan Carvey
<keydet89@...oo.com> wrote:
>
> > Network security -> application security -> software
> > security -> ????
> >
> > What do u guys think??
>
> This sort of view is too granular...they are all part
> of information security. The strongest network
> security fails in the face of poor physical security.
>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists