Hi all,
Are there any options for remote wiping Linux systems, in the case of
them being lost or stolen? I'm sure that some funky trigger mechanism
could be set up using dyndns and SSH, but I was looking for something
that would scale to a larger number of devices.
Thanks,
Tony
--
Please
On 14 November 2012 09:25, Tony Whitmore t...@tonywhitmore.co.uk wrote:
Are there any options for remote wiping Linux systems, in the case of them
being lost or stolen? I'm sure that some funky trigger mechanism could be
set up using dyndns and SSH, but I was looking for something that would
On 14 November 2012 09:30, Michael Pavling pavl...@gmail.com wrote:
On 14 November 2012 09:25, Tony Whitmore t...@tonywhitmore.co.uk wrote:
Are there any options for remote wiping Linux systems, in the case of
them being lost or stolen? I'm sure that some funky trigger mechanism could
be set
http://preyproject.com/ comes to mind.
I agree with encryption being a better option, but the risk is if you don't
shut down then your encryption key is still stored in RAM (most cold boot RAM
extraction issues have been solved by shutdown scripts in the last few years, I
think?) and if
On 2012-11-14 09:30, Michael Pavling wrote:
On 14 November 2012 09:25, Tony Whitmore t...@tonywhitmore.co.uk
wrote:
Are there any options for remote wiping Linux systems, in the case
of them being lost or stolen? I'm sure that some funky trigger
mechanism could be set up using dyndns and
On 14 November 2012 10:04, Tony Whitmore t...@tonywhitmore.co.uk wrote:
I quite agree Michael, but at the moment encryption is not what they are
looking to do.
Ah... I see, corporates have made a decision about a solution, and are now
looking for a problem it fits :-)
What is their use-case
Oh dear. This old chesnut again. Michael is absolutely right. They need an
information security policy to cover use, storage and transport of data
before they go leaping to BBC1 'Spooks' solutions.
If I want to acquire data off a hooky laptop, first thing I do is remove
the hard drive to a usb
On 2012-11-14 10:24, Michael Pavling wrote:
The remote wipe stuff works well for machines that have their own
network connections (3G phones and tablets), but for a desktop or
laptop, it's not that likely to be of much use. If the machine
auto-logs in, so that Ronnie or Reggie can at least use
On Wed, Nov 14 at 11:51, Full Circle Podcast wrote:
Oh dear. This old chesnut again. Michael is absolutely right. They need an
information security policy to cover use, storage and transport of data
before they go leaping to BBC1 'Spooks' solutions.
...
Encryption is not an option, probably
On 2012-11-14 12:14, Bob Dunlop wrote:
On Wed, Nov 14 at 11:51, Full Circle Podcast wrote:
Oh dear. This old chesnut again. Michael is absolutely right. They
need an
information security policy to cover use, storage and transport of
data
before they go leaping to BBC1 'Spooks' solutions.
...
Since this seems to be getting a bit frivolous, I favour the startup option
that says 'Enter password or this machine will self destruct in: and the
big red flashing 04:59 ..04:58.. 04:57..
Sorry, Tony. I know you started this with serious intent.,
--
Please post to:
On Wed, 2012-11-14 at 14:06 +, Victor Churchill wrote:
Since this seems to be getting a bit frivolous, I favour the startup
option that says 'Enter password or this machine will self destruct
in: and the big red flashing 04:59 ..04:58.. 04:57..
I seem to remember in Mission Impossible
On 14 November 2012 09:51, Benjie Gillam ben...@jemjie.com wrote:
I agree with encryption being a better option, but the risk is if you don't
shut down then your encryption key is still stored in RAM (most cold boot
RAM extraction issues have been solved by shutdown scripts in the last few
James Courtier-Dutton james.dut...@gmail.com wrote:
I think it would be nice to see a feature in Linux whereby the suspend
to RAM erases the disk password held in RAM, and prompts the users for
it on resume. That would help make a bit more of the data protected
while in standby.
If you are
14 matches
Mail list logo