Hello, It seems you received a notebook computer whose USB ports were not disabled properly via Group Policy, Dan.
I've logged a ticket with the help desk and someone from IT department will push out a fix shortly. :^) Regards, Aryeh Goretsky At 05:56 AM 1/14/2010, you wrote: >From: Dan Kaminsky <[email protected]> >Precedence: list >MIME-Version: 1.0 >Cc: [email protected] >To: Rich Kulawiec <[email protected]> >References: <[email protected]> > <[email protected]> > <[email protected]> > <[email protected]> > <[email protected]> > <[email protected]> > <[email protected]> > <[email protected]> >In-Reply-To: <[email protected]> >Date: Thu, 14 Jan 2010 14:56:23 +0100 >Message-ID: <[email protected]> >Content-Type: multipart/alternative; boundary=0016e6dab171a53b7f047d204021 >Subject: Re: [funsec] Adobe investigates sophisticatic corporate > networksecurity issue >Message: 9 > >On Thu, Jan 14, 2010 at 2:18 PM, Rich Kulawiec ><<mailto:[email protected]>[email protected]> wrote: >On Wed, Jan 13, 2010 at 03:05:19PM -0800, Paul M. Moriarty wrote: > > Or put another way, expecting end users to change their behavior and > > start doing all the things they "should" be doing is futile. Any approach > > based on this premise will fail. >Absolutely true. "Educating users" is listed as one of Marcus Ranum's >six dumbest ideas in security, and it really is. Spammers and phishers, >among others, prove it millions of times a day. > > >A few years back, Jason Larsen explained to me the great irony of >USB sticks. We've had networking for how many years? But if you've >got ten people sitting around a conference room table, from three >different companies, and all of them need a slide show, guess >what? They're not using network file sharing to share that >file. The odds that they'll all be able to get on the same network >are quite low. See, it's always assumed by IT that in general, the >only people who need access work from the company, and those people >outside have bad untested insecure horrors of laptops. > >So those bad untested insecure horrible outsiders bring in USB 3G >networking and USB sticks. And those sticks get passed around, so >people can get their slides and business can be done. > >How does security react? By banning USB sticks. And what will >people thus use? > >Gmail. > >Watch. The war after USB sticks is 3G networking. Because we've >stopped being good at saying, yes, we have a solution for you. But >we're damn good at saying, HOLY CRAP YOU FOUND A SOLUTION, WE MUST SUPPRESS IT. > >_______________________________________________ >funsec mailing list >[email protected] >https://linuxbox.org/cgi-bin/mailman/listinfo/funsec _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
