wrong issue
From: Ron Wilson <ronw.mrmx_at_gmail.com>
Date: Wed, 13 Apr 2011 13:02:31 -0400
I failed to answer "why", instead, I was answering "what and how".
First, I will acknowlege that a breached computer has no security,
Yes, I do agree that a breached computer has no security.
I do understand that and have for many years.
Also, I understand that the only computer that is 100% secure is
If we assume that any computer that is possible to breach has no
Therefore, to get work done, we must accept the risk that our
So, we should then take 2 broad categories of actions:
1. Minimize the risk of breach. This is a seperate issue.
2. Minimize the amount of sensitive information that gets exposed when
True, there are OS level mechanisms that can help do this, and should
Yes, if a breach occurs while the passwords are still present, the
------------------------------------------------------
To unsubscribe from this discussion, e-mail: [users-unsubscribe_at_tortoisesvn.tigris.org].
|
This is an archived mail posted to the TortoiseSVN Users mailing list.
This site is subject to the Apache Privacy Policy and the Apache Public Forum Archive Policy.