Tony, Quoting Tony Arnold <[EMAIL PROTECTED]>: > Alternatively, encrypt your file systems and disks! Any would be hacker > would then need the encryption key before doing any of the above! > > (Well, she could format the disks, but would not get any information > from them. You need backups for that. In fact unencrypted backups kept > in a locked safe preferably is a must for encrypted systems; in case you > lose the key!)
LOL, this is my biggest fear - forgetting the key to an encrypted file/disk. I forgot one the other day for some of my personal information encrypted using bcrypt - I had to ring my InLaws and as them to post my backup disks back to me! The system's I've encountered are usually based on the "security through obscurity" principle - one of them had /boot as a standard ext3 partition, then /root was mounted via LVM, /var and /tmp via software-RAID, /home was a software-RAID/LVM combo and the whole lot was run ontop of hardware-RAID. It took me nearly an hour to figure that one out and mount all the disks - if it had been a disaster-recovery situation, I pity the poor sod that would have to restore that one! :o) >> Hope I've not given anyone nightmares, > > It's OK, I'm paid to have nightmare about this stuff! LOL, and me - that's why I love my job! :o) Cheers, M. -- Matthew Macdonald-Wallace [EMAIL PROTECTED] http://www.truthisfreedom.org.uk/ -- ubuntu-uk@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk https://wiki.ubuntu.org/UKTeam/