> Encrypt your hard disk.

Hoping that the encryption you use has no backdoor.

> Choose a *very* good password. 

For the encryption, I suppose. That once one has his hands on the
hardware there is no user/prom/bios password stopping his intrusion.

 > Unless they are a honey trap - and then you can see what is actually 
 > trying to break into your network

Honey trap are honey trap, not unguarded computers - I mean computer
people use without care for security.

-- 
 /\           ___                                    Ubuntu: ancient
/___/\_|_|\_|__|___Gian Uberto Lauri_____               African word
  //--\| | \|  |   Integralista GNUslamico            meaning "I can
\/                 coltivatore diretto di software       not install
     giĆ  sistemista a tempo (altrui) perso...                Debian"

Warning: gnome-config-daemon considered more dangerous than GOTO


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/21160.7127.230649.766...@mail.eng.it

Reply via email to