On Sat, 12 Jun 2010 15:06:47 +0200 "E.T" <ad...@wordpress-fr.fr> wrote:
> > A buildings a building and it depends on what measures are taken. At a > > data center who knows who should be where. At home you can remove > > secure from ttys asking for password on boot -s use solanoids which > > lock the metal case to the pc from bios setting and set the bios to > > prevent boot without pass or cdrom boot, lock doors, have alarms, know > > there shouldn't be ANYONE going in there. It could easily though > > unlikely be more secure aside from the cost of generators if your ups > > goes flat. > > chamber closed, rack closed > > no boot : > > Cd-rom > USB > PXE > ZIP > > Enabled anti-malware bios, not read /boot :) > I'm not sure what you're saying, aside from cages are good? Data centres are often complicated and have many with keys or lockpics, kvms or people leaving fingerprints around etc and the machines have been rebooted a lot, without precautions. We've always said fingerprint readers were insecure but convenient, now most people are only just realising this. The number of times I see security firms make stupid mistakes is rediculous because security is often intangible unless something terribly blatant happens. If I thought physical security to my system at home was so important, I can guarantee that I could make it more secure than most data centre's and obviously ones that aren't in a military bunker and I would only need to trust myself. I also train most days which would add an extra layer, if I was in or near. Security is a process of choices, not a choice. At home you have more control over choices, but likely less resources. Of course that guy in Dubai has his own private spy satellite, his home could really be something, if he cared and knew the right people.