![]() |
2007-12-12
, 23:57
|
|
Posts: 1,076 |
Thanked: 176 times |
Joined on Mar 2007
|
#41
|
![]() |
2007-12-13
, 02:59
|
|
Posts: 641 |
Thanked: 27 times |
Joined on Apr 2007
|
#42
|
Petty tyrants are invariably the worst.
It's not your network. It's the company's. Your job is making sure they can use the network to do theirs. If the user is responsible and the personal device will improve their productivity, everyone benefits if you green-light their access. You might even learn something. Possession shouldn't extend beyond personal pride in your work.
of course the would be attacker would have to know WHAT MAC addresses to spoof in order to get access. Not that it's that hard to figure out but still. Also you would need to be on when that other machine isn't or problems will show up. Of course this is first line of defense, not the last.
The Following User Says Thank You to barry99705 For This Useful Post: | ||
![]() |
2007-12-13
, 14:24
|
|
Posts: 1,361 |
Thanked: 115 times |
Joined on Oct 2005
@ Toronto, Ontario, Canada
|
#43
|
![]() |
2007-12-15
, 14:49
|
Posts: 13 |
Thanked: 1 time |
Joined on Aug 2007
|
#44
|
![]() |
2007-12-15
, 15:31
|
Posts: 833 |
Thanked: 124 times |
Joined on Nov 2007
@ Based in the USA
|
#45
|
"No one can serve two masters; for either he will hate the one and love the other, or he will be devoted to one and despise the other. You cannot serve [productivity] and [security]."
<snip>
The Following User Says Thank You to gemniii42 For This Useful Post: | ||
![]() |
2007-12-15
, 16:57
|
|
Posts: 3,096 |
Thanked: 1,525 times |
Joined on Jan 2006
@ Michigan, USA
|
#46
|
![]() |
2007-12-17
, 17:31
|
|
Posts: 4,930 |
Thanked: 2,272 times |
Joined on Oct 2007
|
#47
|
The fact is ANYONE can compile some software, put it in a deb, and stick it on the repo. Are far as I can see there is nothing in place to prevent spyware, rootkits, and other malicous code.
I have a seperate boot SD for use at work, it has only packages I compiled myself(On top of Nokia base. I also did some sniffer testing to make sure I did not see any strange packets going to unknown places. I think I am 99.9% sure I am good. I think I am probably the same for my other boot instances I use for home or development, but I am just not going to take any chances....
The Following User Says Thank You to Benson For This Useful Post: | ||
![]() |
2007-12-17
, 18:20
|
|
Posts: 641 |
Thanked: 27 times |
Joined on Apr 2007
|
#48
|
Not sure how I missed this thread for so long, because I have been thinking of starting my own.
The fact is ANYONE can compile some software, put it in a deb, and stick it on the repo. Are far as I can see there is nothing in place to prevent spyware, rootkits, and other malicous code. I have a seperate boot SD for use at work, it has only packages I compiled myself(On top of Nokia base. I also did some sniffer testing to make sure I did not see any strange packets going to unknown places. I think I am 99.9% sure I am good. I think I am probably the same for my other boot instances I use for home or development, but I am just not going to take any chances....
I have been wondering about the new initatives at Nokia to embrace the opensource projects. On the packages they certify, is someone going through that code or doing some type of security.
Perhaps some type of certification process/community review with a secure repo would be nice. Not everything would have to be in it, but it would be a start
![]() |
2007-12-17
, 19:46
|
|
Posts: 4,930 |
Thanked: 2,272 times |
Joined on Oct 2007
|
#49
|
The Following User Says Thank You to Benson For This Useful Post: | ||
![]() |
2007-12-18
, 14:38
|
|
Posts: 1,361 |
Thanked: 115 times |
Joined on Oct 2005
@ Toronto, Ontario, Canada
|
#50
|
The Following User Says Thank You to Hedgecore For This Useful Post: | ||