Dooh! my e-mail is <A HREF="mailto:philip.perry@prudential.co.uk">philip.perry@prudential.co.uk</A> or <A HREF="mailto:philip.perry@cableol.co.uk">philip.perry@cableol.co.uk</A> <p> Phil Perry<br><a href=mailto: philip.perry@prudential.co.uk> philip.perry@prudential.co.uk</a><br><a href= > </a><br>
Does anyone have any existing metrics on 'typical' NT4 Server availability or any numbers relating to their own experience that I can use to build some stats?<br>
<br>
If y'all e-mail me with your experience, I'll post the average back. It would help if you could indicate size of...
I agree with all you say - but it doesnt wash in a corporate environment. Lots of bespoke legacy client server apps with vb front ends etc, plus thousands of users who would need retraining. I also agree about WINE, especially now that Corel is pouring funds into the project, but there will...
Check out a little israeli company called MainSoft (MS ..geddit?) who got lots of funding from *someone* in the states and moved their base there. They have a in perpetuity (yes as in for ever) license to the Windows API source code from uncle bill. Currently Solaris, SCO and Linux next year...
I made the assumption that the disks were to be de-classified, as you are going to re-use them on other classified projects you are quite right (assuming that US and UK secret squirrel rules are the same).<br>
<br>
I think your last point is correct, and the problem is that users like us are...
Big problem.<br>
<br>
Anyone using a sniffer can detect stray packets from your network via the modem links. Thus any IP masquerading in the firewall is defeated and may enable an attack on the hosts table (and other attacks).<br>
<br>
Also they may download a trojan horse which will activate...
What level of assurance are you aiming for?<br>
<br>
"Secret" has very little meaning unless you know all the other factors in the accounting and audit assrance calculation. e.g. environment, no of potential attackers, available facilities, opportunity, publicity and accountability.
<A HREF="http://www.itsec.gov.uk" TARGET="_new">www.itsec.gov.uk</A> has a listed of currently accredited products and their assurance level.<br>
<br>
I presume that this is for use on drives containing nothing higher than 'restricted' data as otherwise they should be destroyed by a GCHQ...
Looking at the ata-3 spec there seems to be two obvious weaknesses:<br>
1. The security word of the BIOS is reaad-write and bit 1 indicates whether security is enabled - I suspect this could be changed with debug.<br>
2. There is a bios command to reset the drive to 'factory defaults' which is...
The ata-3 eide hard drive specification allows you to set a password without which the disk is unaccessable. Does anyone know how secure this is? Is it sufficient protection for a notebook computer containing confidential personal data about customers (e.g. regulated by the data protection act...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.