-----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 Robert J. Hansen wrote: > ... Moral of the story: be very careful where you go plugging your > USB tokens into, recognize they are infection vectors and infection > targets, recognize they can be compromised, and act accordingly. Or better yet, use some good security practices like setting up a default-deny system (on one's own computer), especially if running Windows. Most non-exclusive computers (i.e. machines that are shared among, say, a group of employees, or a school/university/work machine, as well as public terminals) have adequate protection (like not allowing root or near-root access to just anyone, or something like Clean Slate (the computers at my school allowed admin access, but the hard drives were rewritten upon reboot unless the program was disabled)). As far as I know, malware is pretty harmless without elevated privileges. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQEVAwUBRjYjf/iOA0Bgp4/LAQMuggf/bx7M/oW+rao+VLpUUj6I+yJ3L4z8TxZj /R/FlO4pva+1pqFr41ThMKpq/5f6d+eEmJj2tvFNA/0GwmhhfZz4w9tzqs1xQuCR hBFYwaCUckOytvuPhbCJBaaFWLgP/V7tdATt6HLHfjDw67zKO+ne5ntpFJL4atIW d+IVogxAlK/lBEJpCwDbmiQs0oh7lnCLKcuPo6hVsKfCAU6VYgB+I+5cC8K6pk38 2EqZxuDQVQ5tczZBscf7u2kLpDO/hkFopPTwikbLSLPr83yYCLiPcN7cwZVQN2nW K9TCPw7z8P3nTLBMxFwo2lf+C5Zsnyr6QOqMNw57f8K3CE33Im5f4g== =xqhn -----END PGP SIGNATURE-----
_______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users