2006/6/19, R. B. Riddick <[EMAIL PROTECTED]>:
But if a bad guy has already root access it does not really matter, (aa) if he has to wait for some minutes or hours, or (bb) if he has just a small time window or (cc) if he can immediately start with scanning for secrets in /dev/mem.
I would argue about this. Allowing an intrunder to deal with your system even one extra minute may lead to tremendous losses depending on what kind of data your system operates with. As Dan mentioned, the cost of data defines means of security you should use to protect it. As for standards, they are Russian national governmental ones appliyng to computer systems that operate confidential, secret and more sensitive data. _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "[EMAIL PROTECTED]"