Subject: | |
From: | |
Reply To: | |
Date: | Wed, 13 Mar 2002 07:54:19 -0800 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Hi Tracy and All :)
Ok... here is a thot to ponder upon.... from the Security Chief side of
the house (yes, visualize Chekov from Star Trek hehe)
What would happen if someone were to gain access to a 3k... and then cut
a SLT? hmmm.... would it have enough data located on the SLT to 'hack' the
system? Is the console logged down every night? Is there a procedure in
place to inform someone that someone did that?
How many consoles sit logged in 24x7?
Physical Security thots... from a the guy in the corner...
Art "Don't rely on what you haven't checked!" Bahrs
----- Original Message -----
From: "Tracy Pierce" <[log in to unmask]>
To: <[log in to unmask]>
Sent: Tuesday, March 12, 2002 9:44 AM
Subject: Re: [HP3000-L] replace drive
> reformatting an old ldev1 shouldn't be too tough - just add the drive as a
> non-ldev1 drive, and prep it for use as just another NEW disk, right?
>
> But compromising the system shouldn't be all that difficult for somebody
> with a network sniffer - just watch VT-MGR ports for HELLO dialogs. Even
a
> Security/3000-secured system should be hackable given enough time to
collect
> all the passwords.
>
> hopefully I'm being protected by something I don't know about? I'd love
to
> think so, but I'm very afraid I'm protected only by obscurity. sure
there's
> a firewall, but it has holes so we can get through from outside.
>
> How / where would an attacker attach to the internet where they can
receive
> my packets?
>
> routers & switches & bears, oh my.
>
> TPierce
>
> * To join/leave the list, search archives, change list settings, *
> * etc., please visit http://raven.utc.edu/archives/hp3000-l.html *
* To join/leave the list, search archives, change list settings, *
* etc., please visit http://raven.utc.edu/archives/hp3000-l.html *
|
|
|