Back to the main page

Mailing List Logs for ShadowRN

From: Mike Elkins <MikeE@*********.COM>
Subject: Re: Hacking Security Tallies (Was Re: Weird Campaigns)
Date: Thu, 21 May 1998 14:57:10 -0500
>Yep, I agree with this one, for the hard core ultra-secure places. But
>for the less secure places, it may be a bit more painful.

I can't imagine any Green or higher system NOT requiring a special
hardware procedure to modify the basic security setup. You can't
locate the ICE's executeable file and delete it before it gets triggered, for
example. There is NO reason a legitimate remote user should be able to
reconfigure the security on your system. You should only need to do
that a couple of times a year.

For an ultra-secure system, there would be the key, plus a keypad for
password. The key could only be turned when the machine was OFF,
and the machine would not connect to the matrix until the key was
turned back to the "secure" position. In addition, any time the key was in
place, the room lighting would go red and a bell would sound, all under
hardware--not software--control.

Double-Domed Mike
--Speech Input: Years beyond Microsoft!

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.