Interesting topic, especially looking at the current cloud trends. We've
been discussing this internally and came to the conclusion, that as long
as someone has physical access to a server, he will always be capable of
reading the data on that server with more or less effort.
Even using a high
Good Morning!
The cloud is completely anonymous, that makes the feeling to do
something (as a provider) much lower in my opinion. Knowing someone,
even the face, is much better. Since I know this point I did not call it
"physical security" but "security through obscurity" on purpose. Since
such a
Good morning,
If you care so much about physical penetration of your equipment, why
bother with local storage anyway.
There are enough solution out there, which do not need to have a
installed system.
As example:
Coreboot with etherboot (payload)
this combination allows you to load a system with
ok, more to the details.
I. SSH auth. forwarding
=
on my PC, I have my private SSH key, encrypted with a good password. As I
control this environment, I make sure this is the only copy of my private key,
and all backup copies are encrypted with other passwords.
On my VPS that I
On 2 Jun 2012, at 05:49, Stanislav Sinyagin wrote:
> When I'm logged in to the VPS, I can do
> ssh -A ssinyagin@1.2.3.4
> with this command, the server 1.2.3.4 authenticates me through my public key,
> and the VPS acts as the SSH agent proxy. So, if that server has my public key
> in .ssh/au
>
> From: Jeroen Massar
>To: Stanislav Sinyagin
>Cc: Silvan Gebhardt ; "swinog@lists.swinog.ch"
>
>Sent: Saturday, June 2, 2012 4:05 PM
>Subject: Re: [swinog] hosting for 1 powersupply with lan port
>
>
>On 2 Jun 2012, at 05:49, Stanislav Sinyagin wrote:
>
> From: Jeroen Massar
>
>On 2 Jun 2012, at 05:49, Stanislav Sinyagin wrote:
>
>
>
>When I'm logged in to the VPS, I can do
>>
>> ssh -A ssinyagin@1.2.3.4
>>with this command, the server 1.2.3.4 authenticates me through my public key,
>>and the VPS acts as
7 matches
Mail list logo