On 27 Oct 2010 at 14:30, Ames Matthew B wrote:
> We do this, but use RFID tags to save us having to log in. The rfid tag
> also provides the ability to do secure printing, where the job is only
> released once you get to the printer.
I hope they're subcutaneous RFID tags, otherwise someone could use your card.
Of course, I guess anyone with the desire can clone them anyway ...
http://www.google.com/search?q=rfid+clone
Wired 14.05: The RFID Hacking Underground
"They can steal your smartcard, lift your passport, jack your car,
even clone the chip in your arm. And you won't feel a thing. 5 tales
from the RFID-hacking underground."
http://www.wired.com/wired/archive/14.05/rfid.html
--
Angus Scott-Fleming
GeoApps, Tucson, Arizona
1-520-290-5038
Security Blog: http://geoapps.com/
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin