On Sat, 12 Jun 2010 15:06:47 +0200
"E.T" <ad...@wordpress-fr.fr> wrote:

> > A buildings a building and it depends on what measures are taken. At a
> > data center who knows who should be where. At home you can remove
> > secure from ttys asking for password on boot -s use solanoids which
> > lock the metal case to the pc from bios setting and set the bios to
> > prevent boot without pass or cdrom boot, lock doors, have alarms, know
> > there shouldn't be ANYONE going in there. It could easily though
> > unlikely be more secure aside from the cost of generators if your ups
> > goes flat.
> 
> chamber closed, rack closed
> 
> no boot : 
> 
> Cd-rom
> USB
> PXE
> ZIP
> 
> Enabled anti-malware bios, not read /boot :)
> 

I'm not sure what you're saying, aside from cages are good?

Data centres are often complicated and have many with keys or lockpics,
kvms or people leaving fingerprints around etc and the machines have
been rebooted a lot, without precautions. We've always said fingerprint
readers were insecure but convenient, now most people are only just
realising this. The number of times I see security firms make stupid
mistakes is rediculous because security is often intangible unless
something terribly blatant happens.

If I thought physical security to my system at home was so important, I
can guarantee that I could make it more secure than most data centre's
and obviously ones that aren't in a military bunker and I would only
need to trust myself.

I also train most days which would add an extra layer, if I was in or
near.

Security is a process of choices, not a choice. At home you have more
control over choices, but likely less resources.

Of course that guy in Dubai has his own private spy satellite, his home
could really be something, if he cared and knew the right people.

Reply via email to