Full Disclosure mailing list archives
Where is the sec ind gng?
From: "lists.inbox" <lists.inbox () gmail com>
Date: Mon, 13 Sep 2004 12:50:03 -0400
Example: This new cpu-geek-coffy shop/ bar down the street has 36 brand spanking new 3ghz 512m ram ddr 400hz... all connected to high speed for games and whatnot... 1rst week point, the boxes are right in front of you on the desk, with cdroms working and all, floppies working, cases unlocked... 2nd, bios isnt password protected, (boot from cd...aka any live linux distro and its over, you can do a number of things, the less serious ones include sniffing the network for the admin passes to "game interface" that decides how much time you have left) But...oh yea....this is why u sould never have a case unlocked in front of someone u dont know... ... anybody need some ram? ... lol On Mon, 13 Sep 2004 08:59:34 -0700 (PDT), Harlan Carvey <keydet89 () yahoo com> wrote:
Network security -> application security -> software security -> ???? What do u guys think??This sort of view is too granular...they are all part of information security. The strongest network security fails in the face of poor physical security. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Where is the sec ind gng? lists.inbox (Sep 13)