> Back in the day, I had a SLMR tagline that said: "Real programmers type > C:> COPY CON: PROGRAM.EXE". That was funny in the days of standalone > DOS and keyboards. But in a networked system it ain't so funny! It > goes back to that "co-operation" point I made above.
That's wat Charles said too... Actually I had thought about this myself but figured if it had to come to that they'd most likely give up. >> Using VMware however I have no reason for any other type of access than >> console, so in order to get access to the LEAF box one would first have >> to gain control over an internal machine capable of running VMware >> console. Essentially this would be the only reason for not using VM, >> being unable to force physical access only. This was also a consideration. The only way to gain access to my LEAF box is to get into the console. There is no SSH or Telnet or VNC or whatever else you can think of. To get ON the box the hacker needs to get on the wrong side first. Depending on his intentions* this would make it pointless to change anything on the LEAF box since he already accomplished his goal. * Spammers trying to use my computer for sending spam might not like my firewall blocking outgoing traffic to port 25. -- On the 'humanizing' subject: if you'd use some kind of roll-code method there may still exist a security risc but the chances of anyone hitting the jackpot would be ridiculously low. Twice would be a miracle! On the other hand - let's not get ahead of ourselves. Gordon ------------------------------------------------------------------------- This SF.net email is sponsored by: Microsoft Defy all challenges. Microsoft(R) Visual Studio 2008. http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/ ------------------------------------------------------------------------ leaf-user mailing list: leaf-user@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/leaf-user Support Request -- http://leaf-project.org/