I currently use remote access to get to my PC and servers from my home
over my cable modem. I used to use PC Anywhere to access my PC but since
I got XP and it has Terminal Services built in, I use that. We use VPN
connection into our network to provide the security for the link.
[EMAIL
[EMAIL PROTECTED] writes:
greetings everyone,
I am planning on writing a research paper on digital privacy. It's only
a
highschool level research paper, so it isn't a huge project. My question
is,
can anyone recomend any good books involving computer privacy related
material including
This is not entirely accurate. You can use 3rd party software to lock
down win9x systems such as gs98 from ARC software
[EMAIL PROTECTED] writes:
windows98 was never meant to be a corporate orientated dekstop
internetworking OS, it was meant to be a home user platform or very small
offices, as
Try AutoClave
http://staff.washington.edu/jdlarios/autoclave/
[EMAIL PROTECTED] writes:
I am looking for a good utility to erase all hard drives
in a machine to a DOD standard. I would prefer a
FREE utility as this is a government agency and I try
to keep costs down.
I have read that
Not all that long ago I was in a similar position at a previous employer.
I found a good resource in a book called e-policy: How to Develop
Computer, E-mail, and Internet Guidelines to Protect Your Company and its
Assets by Michael R. Overly. It has guidelines and suggestions for
creating a
. Tech [mailto:[EMAIL PROTECTED]]
Sent: February 26, 2002 3:55 PM
To: [EMAIL PROTECTED]; Bill Barrett
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: Encryption Basics
Recommending a book like applied cryptography to a beginner is like
giving a
3 year old a car and telling them to drive
[EMAIL PROTECTED] writes:
-Original Message-
From: Erik Tayler [mailto:[EMAIL PROTECTED]]
And I concur with Bill about people referencing others
to Google (or other engines for that matter). It hardly
demonstrates that you are trying to help someone.
Actually I would have to
[EMAIL PROTECTED] writes:
Found the link.
http://www.cacr.math.uwaterloo.ca/hac/
You can also download Applied Cryptography for free. I can't remember
where
but I have done it myself. I had the whole book, but I wiped my hard
drives.
Trevor
- Original Message -
From: Bill Barrett [EMAIL
You know these kind of relpies really annoy me. For the beginner a google
search will turn up lots of resouces, many of them with incorrect
information. It can be very intimidateing for those just starting out in
the field. We that know more should help those that are tring to learn.
After all
No system like that should be left out on the internet like that without a
firewall. While I don't personally know of a way to break into this
system you can be sure that somebody out there does, and they are just as
likely to be malicious as not. Personally I wouldn't want my corporate
data
[EMAIL PROTECTED] writes:
-BEGIN PGP SIGNED MESSAGE-
On Tue, 5 Feb 2002 [EMAIL PROTECTED] wrote:
What is the security communities recommendation on naming servers? Is
it safe to name a server by the function the server provides?
There's two vastly opposed views on server
11 matches
Mail list logo