lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <9cf6589e0409130950240331f9@mail.gmail.com>
From: lists.inbox at gmail.com (lists.inbox)
Subject: Where is the sec ind gng?

Example:

This new cpu-geek-coffy shop/ bar down the street has 36 brand
spanking new 3ghz 512m ram ddr 400hz...
all connected to high speed for games and whatnot...

1rst week point, the boxes are right in front of you on the desk, with
cdroms working and all, floppies working, cases unlocked...

2nd, bios isnt password protected, (boot from cd...aka any live linux
distro and its over, you can do a number of things, the less serious
ones include sniffing the network for the admin passes to "game
interface" that decides how much time you have left)

But...oh yea....this is why u sould never have a case unlocked in
front of someone u dont know...    ... anybody need some ram? ... lol


On Mon, 13 Sep 2004 08:59:34 -0700 (PDT), Harlan Carvey
<keydet89@...oo.com> wrote:
> 
> > Network security -> application security -> software
> > security -> ????
> >
> > What do u guys think??
> 
> This sort of view is too granular...they are all part
> of information security.  The strongest network
> security fails in the face of poor physical security.
> 
> 
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ