Bhaskar, KS wrote: > If you are concerned about the repercussions from the potential theft > of a PC running VistA on Linux, place the database & journal files on > a loop-aes encrypted file system. >
Yes, it is quite simple for the end user to use. So I am always flabbergasted when I hear about some intelligence officer losing his laptop with sensitive information on the train or whatever and everyone being in a panic because the data may fall into the wrong hands. Loopback-aes is the solution for such things. > It will take the computing resources of someone like the NSA or IBM to > recover the information. > They won't be able to decrypt it either without the key (unless they have some futuristic technologies at hand already). I think it would require the CIA, extraordinary rendition, sodium pentothal and rubber hose protocols to get the information back. > Two further precautions are to put your swap space on a file in an > encrypted file system, > I would advise loopback-aes is run only with an encrypted swap. > and to password protect the BIOS. > Weak, since that is fairly easy to bypass, but no harm. > > To me, a greater risk than the PCs themselves are the backup tapes and > CDs. They are often junked after use and the sport of dumpster diving > will provide valuable information. So, don't forget to encrypt your > backups. > The weakest link is always human error. regarda PJ ------------------------------------------------------- All the advantages of Linux Managed Hosting--Without the Cost and Risk! Fully trained technicians. The highest number of Red Hat certifications in the hosting industry. Fanatical Support. Click to learn more http://sel.as-us.falkag.net/sel?cmd=lnk&kid=107521&bid=248729&dat=121642 _______________________________________________ Hardhats-members mailing list Hardhats-members@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/hardhats-members