I work as a contractor for a government agency & can confirm that this is
correct. There are (not free) tools that we use to wipe hard drives for
re-use in the same classified environment, but we do not allow disks that
are classified to ever be used in an unclassified environment. When the
disks a
IMHO, guest users should have the most restrictive possible access to system
hard drives or other information that they can hack. I am not sure, but it
sounds like the guest is using one of your computers to access the Internet.
Otherwise, they should not see anything other than the web site itself
Our IT department has things set up to scan for viruses and block all
"virusy" email inbound, so I haven't seen this particular problem. At home,
where I am the IT department, I've set up my email program to not download
mail from certain addresses that I find either offensive or "virusy." It
sits
Several solutions come to mind-
- MS Outlook has an encryption process that will provide some level of
security enroute.
- Several projects that I am on use portals to share documents, with access
controlled by invitation and "rating" for what actions can be performed. An
authorized user can downlo
There is a "generic" book titled "Hacking Exposed" that may be useful. A
good, if dated book, is "The Cuckoo's Egg," which describes a hacker and the
efforts to track him down.
Mike
-Original Message-
From: Simon Taplin [mailto:[EMAIL PROTECTED]]
Sent: Thursday, December 26, 2002 4:56 AM
Please accept my apologies if this is not the appropriate forum for this
question..
I am researching the relative value of various professional certifications
in the IT field. Specifically for the security area, would anyone care to
share their experiences or views on the certifications av