Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Thieves Winning Online War, Maybe in Your PC
New York Times ^ | 12/5/2008 | By JOHN MARKOFF

Posted on 12/06/2008 4:39:18 PM PST by Swordmaker

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-73 next last
To: Swordmaker

At work I’m STRONGLY advocating a policy I came up with that forbids internal networks and computers to have any physical path or access to the internet at all. I have created an entirely separate physical network that computers can use to go online. In all work areas there can be a computer that is there for internet use, and internet use ONLY.

So far, I’m running into stiff resistance, so I doubt it will happen. Being a hospital, I don’t think we can or should risk any computer that handles patient information to have access to the internet. At least I tried.... Two years ago I found a key logger running on a registration computer. I went screaming to my boss about it, and his eyes glazed over when I tried to explain to him what a key logger was(typical IT director).


21 posted on 12/06/2008 5:15:59 PM PST by KoRn
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
Thank you, again MSFT.

Or is MFS--T?

22 posted on 12/06/2008 5:19:16 PM PST by Tribune7 (Obama wants to put the same crowd that ran Fannie Mae in charge of health care)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

bookmark


23 posted on 12/06/2008 5:25:13 PM PST by GOP Poet
[ Post Reply | Private Reply | To 2 | View Replies]

To: CitizenUSA
but Apple Corp. doesn’t seem to have any concern whatsoever for anyone who likes to game on occasion.

It's not really Apple's fault. Microsoft's DirectX won the battle with OpenGL, thus chaining games to the Windows platform. It's going to take a fundamental shift in a number of areas--improved OpenGL support on the part of nvidia and ATi, greater amounts of Mac users, and a clear financial justification for hiring OS X programmers and taking the time to learn the intricacies of the OS. Those are a lot of barriers to overcome, especially since we have Boot Camp now.
24 posted on 12/06/2008 5:26:24 PM PST by Terpfen (Ain't over yet, folks. Those 2004 Senate gains are up for grabs in 2 years.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: proxy_user
The key in Unix/Linux systems is that the user can’t do anything to the system - only root can. You want configure your system, you su to root.

That's right.

Amazing << Hear this. Feel this, and tell me that this isn't music.
Groove to Black Violin EPK, too.


25 posted on 12/06/2008 5:26:32 PM PST by rdb3 ([T]he cool regions of the head are easily trumped by the raging fires of the heart.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: KoRn

CIS student here. Just out of curiosity, could you expand a little bit? How did you plan to physically house a second network parallel to your hospital’s existing intranet?


26 posted on 12/06/2008 5:29:05 PM PST by Terpfen (Ain't over yet, folks. Those 2004 Senate gains are up for grabs in 2 years.)
[ Post Reply | Private Reply | To 21 | View Replies]

To: rdb3

Awesome stringz, sometimes words have no place in music...


27 posted on 12/06/2008 5:30:42 PM PST by SouthDixie (We are but angels with one wing, it takes two to fly.)
[ Post Reply | Private Reply | To 25 | View Replies]

To: KoRn

If you need web browsing you can set up a filtered proxy server. If you need email, you can set up an internal SMTP server.

That is the way most businesses handle it.


28 posted on 12/06/2008 5:30:45 PM PST by proxy_user
[ Post Reply | Private Reply | To 21 | View Replies]

To: ShadowAce

Tech ping!


29 posted on 12/06/2008 5:32:32 PM PST by rabscuttle385 ("If this be treason, then make the most of it!" —Patrick Henry)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

I knew his brothers, Wackoof and Jackoff!


30 posted on 12/06/2008 6:10:06 PM PST by Doc Savage ("Are you saying Jesus can't hit a curve ball? - Harris to Cerrano - Major League)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Bump


31 posted on 12/06/2008 6:22:31 PM PST by dangerdoc (dangerdoc (not actually dangerous any more))
[ Post Reply | Private Reply | To 1 | View Replies]

To: proxy_user
"If you need web browsing you can set up a filtered proxy server. If you need email, you can set up an internal SMTP server."

That's what we do. We also use firewalls. Malware still sometimes gets through via Internet Explorer.

32 posted on 12/06/2008 7:10:30 PM PST by KoRn
[ Post Reply | Private Reply | To 28 | View Replies]

To: driftdiver

Um, you can’t give your account root level privs in the GUI, and hacking your account in terminal is a big pain. Not on a Mac, sorry.


33 posted on 12/06/2008 7:27:21 PM PST by Spktyr (Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: KoRn

Another approach might be to separate servers from clients. Keep your patient data on Unix machines with no GUI. Access it from Windows, or better yet, use thin clients. These might have a web browser, but it would run on a Unix box and be served remotely over the network.

This would be more economical and more secure, and is one of the newer approaches to IT architecture aimed at businesses where security is more important than convenience.

Of course, workers might complain about not being able to goof off. You’d have to tell them that the computers are for work.


34 posted on 12/06/2008 7:30:40 PM PST by proxy_user
[ Post Reply | Private Reply | To 32 | View Replies]

Comment #35 Removed by Moderator

To: Spktyr

” hacking your account in terminal is a big pain. “

FOR YOU MAYBE, BUT NOT FOR SOMEONE THAT KNOWS WHAT THEY ARE DOING.


36 posted on 12/06/2008 8:23:26 PM PST by Sunnyflorida (Unless you are nice and thoughtful you will be ignored. Write in Thomas Sowell.)
[ Post Reply | Private Reply | To 33 | View Replies]

To: KoRn

” I found a key logger running on a registration computer. “

Save your breath. “You have no privacy, get over it.” S McNealy.


37 posted on 12/06/2008 8:25:44 PM PST by Sunnyflorida (Unless you are nice and thoughtful you will be ignored. Write in Thomas Sowell.)
[ Post Reply | Private Reply | To 21 | View Replies]

To: Sunnyflorida

NICE CAPS.

Then tell us how it’s done in Mac OS X 10.5.5.


38 posted on 12/06/2008 8:27:25 PM PST by Spktyr (Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
[ Post Reply | Private Reply | To 36 | View Replies]

To: Sunnyflorida

Oh, and before you flip the “what, you don’t know either?” back at me, I already have the tech note up on my screen.

Here’s a hint - root is turned off by default.


39 posted on 12/06/2008 8:29:11 PM PST by Spktyr (Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
[ Post Reply | Private Reply | To 36 | View Replies]

Comment #40 Removed by Moderator


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-73 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson