On 27 Oct 2010 at 14:30, Ames Matthew B  wrote:

> We do this, but use RFID tags to save us having to log in.  The rfid tag
> also provides the ability to do secure printing, where the job is only
> released once you get to the printer. 

I hope they're subcutaneous RFID tags, otherwise someone could use your card.

Of course, I guess anyone with the desire can clone them anyway ...

    http://www.google.com/search?q=rfid+clone

    Wired 14.05: The RFID Hacking Underground 
    "They can steal your smartcard, lift your passport, jack your car, 
    even clone the chip in your arm. And you won't feel a thing. 5 tales 
    from the RFID-hacking underground."  
    http://www.wired.com/wired/archive/14.05/rfid.html  

--
Angus Scott-Fleming
GeoApps, Tucson, Arizona
1-520-290-5038
Security Blog: http://geoapps.com/





~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to