On Tuesday, May 28, 2002, at 05:27 , Jonathan E. Paton wrote: [..] > Never rely totally on software based security. There is no point > installing/writing lots of security software if your system admin is > a KGB agent, or your cleaner can access your computer system. > > EVERY computer can be cracked with physical access. [..]
Just to stomp the last bit out of this thread. Since I think in the main jonathan has done an excellent layout. IF you are really planning 'secure computing' - then you already have read the tempest guide. You also know that you will be shredding the hard drives before the leave the facility.... along with the memory chips... for those of you who have never tossed things into an FM-10 Diesel powered shredder[1] - trust me - the data is not recoverable - just make sure that you are not in the way if the grinder blades do a kick back - that's why there are those 'dings' in the bulk head.... oh sorry - you just meant to do multiple writes of random data with a highly improved probability that the reuse of datablock allocations from the underlying device have sufficiently scrambled the data set so as not to be recoverable. The problem of course is IF there is a 'journaling' FS - that is making multiple backup layers... ciao drieux --- [1] FM-10's were what we used to power diesel submarines - trust me you can kiss your hard drive good by after one of these puppies 'eats your data'. ps: remember to bring raw meat for the marines doing guard mount - they will be easier to relate to. -- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]