On Thursday, 08/31/2006 at 12:13 CET, Phil Payne <[EMAIL PROTECTED]> wrote: > The same undelete technology that works so well on Windows PCs also works with > smartphone > memory. Perhaps there's a case not only for controlled distribution of > passwords, but also > for their controlled withdrawal.
And, more importantly, change. I know of a large multinational IT company that has a 90-day password change policy, applying to system AND network access. It doesn't close the window completely, of course, but it *does* reduce risk. - How long since I changed my pw did I lose/throw away my smartphone? - How long did it take someone to find it? - How long did it take them to break into it? - How long did it take them to figure out it it was worthwhile to try it? Polices that suspend network/system access due to inactivity help as well. "Sometimes you're the windshield; sometimes you're the bug." Alan Altmark z/VM Development IBM Endicott ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

