On Thu, Feb 28, 2013 at 03:00:11PM +, anonymous2...@nym.hush.com wrote:
> In parts of Africa and other places, people are
> barely techno-literate to be able to turn on a windows machine -
> even after consideriable training.
Then why would you even consider trying to get them to use one?
On Thu, Feb 28, 2013 at 08:35:14PM +, anonymous2...@nym.hush.com wrote:
> Most of what I have gotten so far are lectures and rhetoric.
I'm not sure what else you expected. (Really, I'm not.)
You didn't explain what you're trying to do. You showed up with
a list of middling-to-hideously-poor
Hi anon. You've asked a public mailing list of mostly non-security
professionals a broad question on how to secure your infrastructure, with
only a list of technologies and products to start from. This is not going
to yield anything useful.
If your organization has a budget for securing its infras
Thanks, a very productive mail.
Please keep this subject on topic.
On Fri, 01 Mar 2013 16:55:53 + "The Doctor"
wrote:
>On 02/28/2013 03:35 PM, anonymous2...@nym.hush.com wrote:
>> Thanks, yes I also have seen young and old people use linux but
>> I've also seen hundreds of people trained to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 02/28/2013 03:35 PM, anonymous2...@nym.hush.com wrote:
> Thanks, yes I also have seen young and old people use linux but
> I've also seen hundreds of people trained to use it and as soonas
> they have to
update a package
> in Linux, get confused and
anonymous2...@nym.hush.com:
> Thanks, yes I also have seen young and old people use linux but I've also
> seen hundreds of people trained to use it and as soonas they have to update a
> package in Linux, get confused and reach for a windows machine. The NGO in a
> box stuff is ok but not what I
On Feb 28, 2013 7:40 PM, wrote:
> Hi,
> We are a human rights NGO that is looking to invest in the best
> possible level of network security (protection from high-level
> cyber-security threats, changing circumvention/proxy to protect IP
> address etc, encryption on endpoints and server, IDS/Phys
Thanks, yes I also have seen young and old people use linux but I've also seen
hundreds of people trained to use it and as soonas they have to update a
package in Linux, get confused and reach for a windows machine. The NGO in a
box stuff is ok but not what I am asking about at all, I'm speaking
Speaking of GUNE/Linux operating systems, I am personally a big fan of
LiveCDs such as Tails (https://tails.boum.org/), where you don't need to
install any software on a computer and loose all data (almost all data)
on a reboot.
Journalists, activists in high risk countries can have multiple copie
..on Thu, Feb 28, 2013 at 03:00:11PM +, anonymous2...@nym.hush.com wrote:
> If you think you can get a board member or a finance person in an NGO to use
> Linux then you are detached from the reality of how most NGO's work. The use
> will simply ignore it.
Really? Have you tried a recent deskt
Hi,
On Thu, Feb 28, 2013 at 10:00 AM, wrote:
> Thanks I appreciate the input but this is where one of the problems
> with the LibTech approach lies, having spent years training
> hundreds of people all over the world with TrueCrypt, TOR,
> PGP/Thunderbird etc I can tell you that the systems are s
drone_guinness1 borgnet:
> ...end users using Linux :-D (good one)
so you say that android users aren't end users?
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing your settings at
https://mailman.stanford.edu/mailm
Thanks I appreciate the input but this is where one of the problems
with the LibTech approach lies, having spent years training
hundreds of people all over the world with TrueCrypt, TOR,
PGP/Thunderbird etc I can tell you that the systems are simply not
user friendly enough for the vast majorit
anonymous2...@nym.hush.com:
> Hi,
> We are a human rights NGO that is looking to invest in the best
> possible level of network security (protection from high-level
> cyber-security threats, changing circumvention/proxy to protect IP
> address etc, encryption on endpoints and server, IDS/Physic
Agreed, this kind of advice is what I was hoping to get on LibTech!
On Thu, 28 Feb 2013 14:16:56 + canto...@hushmail.com wrote:
>Thanks excellent advice - much to think about.
>
>On Thu, 28 Feb 2013 14:09:39 + "Tom Ritter"
>wrote:
>>On 28 February 2013 07:39, wrote:
>>> Hi,
>>> We are
Thanks excellent advice - much to think about.
On Thu, 28 Feb 2013 14:09:39 + "Tom Ritter"
wrote:
>On 28 February 2013 07:39, wrote:
>> Hi,
>> We are a human rights NGO that is looking to invest in the best
>> possible level of network security (protection from high-level
>> cyber-security
On 28 February 2013 07:39, wrote:
> Hi,
> We are a human rights NGO that is looking to invest in the best
> possible level of network security (protection from high-level
> cyber-security threats, changing circumvention/proxy to protect IP
> address etc, encryption on endpoints and server, IDS/Ph
On Thu, Feb 28, 2013 at 12:39:48PM +, anonymous2...@nym.hush.com wrote:
> We are a human rights NGO that is looking to invest in the best
> possible level of network security [snip]
> -Windows 2012 Server
This is an early April Fool's joke, right?
---rsk
--
Too many emails? Unsubscribe, cha
Hi,
We are a human rights NGO that is looking to invest in the best
possible level of network security (protection from high-level
cyber-security threats, changing circumvention/proxy to protect IP
address etc, encryption on endpoints and server, IDS/Physical and
Software Firewall/File Integri
19 matches
Mail list logo