Full Disclosure mailing list archives

Where is the sec ind gng?


From: "lists.inbox" <lists.inbox () gmail com>
Date: Mon, 13 Sep 2004 12:50:03 -0400

Example:

This new cpu-geek-coffy shop/ bar down the street has 36 brand
spanking new 3ghz 512m ram ddr 400hz...
all connected to high speed for games and whatnot...

1rst week point, the boxes are right in front of you on the desk, with
cdroms working and all, floppies working, cases unlocked...

2nd, bios isnt password protected, (boot from cd...aka any live linux
distro and its over, you can do a number of things, the less serious
ones include sniffing the network for the admin passes to "game
interface" that decides how much time you have left)

But...oh yea....this is why u sould never have a case unlocked in
front of someone u dont know...    ... anybody need some ram? ... lol


On Mon, 13 Sep 2004 08:59:34 -0700 (PDT), Harlan Carvey
<keydet89 () yahoo com> wrote:

Network security -> application security -> software
security -> ????

What do u guys think??

This sort of view is too granular...they are all part
of information security.  The strongest network
security fails in the face of poor physical security.



_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: