Dear All
There is contention between security and access in the
event of a fire.
i.e if there _really_ is a fire then you want all the
doors to be unlocked so that people are able to leave
the premises safely (this is easy to achieve). You
also want _all_ the rooms to be accessible from the
outsi
Mmmm I must be phrasing my question badly...
The majority of responses seem to suggest storing All
the passwords in a file (or database) protected by a
shared password. As I mentioned in my email this isn't
suitable because
1. Anyone who requires access to the file/database for
a specific purpose
o having
> a human factor in the
> equation rather than relying on machines.
>
> badenIT GmbH
> System Support
>
> Chris Meidinger
> Tullastrasse 70
> 79108 Freiburg
>
> __
>
> Es gibt 10 arten von Menschen auf dem Planeten,
> welche d
Dear All
Looking through the archive of secuity newsgroups and
mailing lists it looks as though there have been a few
threads related to personal storage of passwords.
Typically this results in a file or index of passwords
encrypted and protected by a single password.
I need to store a number of
> -Original Message-
> From: CreativeSell [mailto:[EMAIL PROTECTED]
> Sent: 30 June 2003 22:50
> To: [EMAIL PROTECTED]
> Subject: Question for you all
>
>
Hi Olly,
Probably the first thing I'd do is get hold of a
private email address that isn't easily associated
with your site and use t
This is going to be one of those "Mmmm is he a
would-be bad guy" type emails...
I want to get hold of precompiled/scripted exploits
that I can demonstrate in a security awareness course.
I'd set up a victim client, a victim server and an
attacker system.
With this I can demonstrate how browsers
> I wasn't completely clear in my last e-mail. I was
thinking more
> along the lines of having the IDS in the DMZ. Any
attacks that get
> past the outside firewall to the DMZ hosts would be
caught by the
> IDS in the DMZ. The attacks that don't make it past
the external
> firewall into the D
I agree that in many cases a tri-homed system is
'adequately secure' however, I think that a dual
firewall implemetation can provide a greater measure
of security.
They may be more prone to failure than a single
firewall - in that the same rule has to be applied to
two different firewalls (and dif
Not being a windows guru ... is it possible to take a
copy of the home user's PC config and use that to
derive a new 'corporate' boot disk.
I can see a world of pain in users having to bring in
their PC but bringing in a backup (or even the
current boot disk) may be possible.
With the info d
Of course the age-old problem with security is that
the access restriction can impact on usability or
support.
If you go ahead with the proposed solution then the
Vendor has significant access to your internal
network.
How much do you trust the vendor?
Are they liable for any damage they cause whi
"It's ok we're behind a firewall"
The response I received from a DBA when I forwarded an
email detailing a security vulnerability in a
particular database application.
And not the first time I have heard this response when
cautioning about security vulnerabilities.
I want to raise the security a
Dear All
I'm sure many people are familiar with how to harden
the OS by reducing the number of packages installed
and limiting the available services - there is
obviously a tradeoff with usability (as ever with
security) as well as cost of administration. For
exposed machines (DNS, webserver, mail
12 matches
Mail list logo