Paul Krizak wrote:
If the technology he's developing is comparable in nature to that of a
Google Search Appliance, then I could see how this would be the case.
For example, the internal index may use database schemas (or data) that
should not be accessible to the customer. Additionally, any PHP/CGI/etc
code loaded on the machine would be good to have hidden from prying eyes
to prevent code theft.
If I were building something akin to a Google Search Appliance, i.e.
something that you bring into an isolated network, plug it in, then
treat it as a "black box" appliance, then I would probably be asking the
same questions he's asking. However, I doubt even the Googles of the
world go to the extreme of actually encrypting the hard disk just to
protect the data and code. A well-engineered firewall and system
configuration that prevents access to confidential data and code is
probably enough to keep most casual observers out. Anybody nefarious
enough to rip the hard disk out of the box to try and get to the data is
probably determined enough to get around any encryption scheme that
would be implemented.
Companies that purchase "black box" servers like this aren't in the
business of stealing code...that's why they buy a "black box", turn it
on, and expect it to "just work".
A competitor might, but a competitor is certainly better than we are.
fwiw Reverse engineering is legal in many places, and licences can't
override the law.
If the OP is serious, he needs to talk to an IT security consultant. If
not, then intrusion detected and something in the boot code, maybe to
erase the disk if the box is powered up after it's been opened.
--
Cheers
John
-- spambait
[EMAIL PROTECTED] [EMAIL PROTECTED]
-- Advice
http://webfoot.com/advice/email.top.php
http://www.catb.org/~esr/faqs/smart-questions.html
http://support.microsoft.com/kb/555375
You cannot reply off-list:-)
_______________________________________________
rhelv5-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/rhelv5-list