From: | Mike Elkins <MikeE@*********.COM> |
---|---|
Subject: | Re: Hacking Security Tallies (Was Re: Weird Campaigns) |
Date: | Thu, 21 May 1998 14:57:10 -0500 |
>for the less secure places, it may be a bit more painful.
I can't imagine any Green or higher system NOT requiring a special
hardware procedure to modify the basic security setup. You can't
locate the ICE's executeable file and delete it before it gets triggered, for
example. There is NO reason a legitimate remote user should be able to
reconfigure the security on your system. You should only need to do
that a couple of times a year.
For an ultra-secure system, there would be the key, plus a keypad for
password. The key could only be turned when the machine was OFF,
and the machine would not connect to the matrix until the key was
turned back to the "secure" position. In addition, any time the key was in
place, the room lighting would go red and a bell would sound, all under
hardware--not software--control.
Double-Domed Mike
--Speech Input: Years beyond Microsoft!