On 5/2/06, Constantine A. Murenin <[EMAIL PROTECTED]> wrote:
If you backup a key from an old workstation onto a new workstation, and then dispose of the old workstation [in the university setting], then what if the intruider gets access to the HDD data (i.e. the key) of the old workstation?
That's what asset disposal policies are for, especially ones that specify which degaussers, shredders and melting tools will be applied to the hard drive before the machine leaves campus. CK -- GDB has a 'break' feature; why doesn't it have 'fix' too?