Skip to comments.
Thieves Winning Online War, Maybe in Your PC
New York Times ^
| 12/5/2008
| By JOHN MARKOFF
Posted on 12/06/2008 4:39:18 PM PST by Swordmaker
click here to read article
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-60, 61-73 next last
To: Swordmaker
At work I’m STRONGLY advocating a policy I came up with that forbids internal networks and computers to have any physical path or access to the internet at all. I have created an entirely separate physical network that computers can use to go online. In all work areas there can be a computer that is there for internet use, and internet use ONLY.
So far, I’m running into stiff resistance, so I doubt it will happen. Being a hospital, I don’t think we can or should risk any computer that handles patient information to have access to the internet. At least I tried.... Two years ago I found a key logger running on a registration computer. I went screaming to my boss about it, and his eyes glazed over when I tried to explain to him what a key logger was(typical IT director).
21
posted on
12/06/2008 5:15:59 PM PST
by
KoRn
To: Swordmaker
Thank you, again MSFT.
Or is MFS--T?
22
posted on
12/06/2008 5:19:16 PM PST
by
Tribune7
(Obama wants to put the same crowd that ran Fannie Mae in charge of health care)
To: Swordmaker
23
posted on
12/06/2008 5:25:13 PM PST
by
GOP Poet
To: CitizenUSA
but Apple Corp. doesnt seem to have any concern whatsoever for anyone who likes to game on occasion.
It's not really Apple's fault. Microsoft's DirectX won the battle with OpenGL, thus chaining games to the Windows platform. It's going to take a fundamental shift in a number of areas--improved OpenGL support on the part of nvidia and ATi, greater amounts of Mac users, and a clear financial justification for hiring OS X programmers and taking the time to learn the intricacies of the OS. Those are a lot of barriers to overcome, especially since we have Boot Camp now.
24
posted on
12/06/2008 5:26:24 PM PST
by
Terpfen
(Ain't over yet, folks. Those 2004 Senate gains are up for grabs in 2 years.)
To: proxy_user
The key in Unix/Linux systems is that the user cant do anything to the system - only root can. You want configure your system, you su to root. That's right.
Amazing << Hear this. Feel this, and tell me that this isn't music.
Groove to Black Violin EPK, too.
25
posted on
12/06/2008 5:26:32 PM PST
by
rdb3
([T]he cool regions of the head are easily trumped by the raging fires of the heart.)
To: KoRn
CIS student here. Just out of curiosity, could you expand a little bit? How did you plan to physically house a second network parallel to your hospital’s existing intranet?
26
posted on
12/06/2008 5:29:05 PM PST
by
Terpfen
(Ain't over yet, folks. Those 2004 Senate gains are up for grabs in 2 years.)
To: rdb3
Awesome stringz, sometimes words have no place in music...
27
posted on
12/06/2008 5:30:42 PM PST
by
SouthDixie
(We are but angels with one wing, it takes two to fly.)
To: KoRn
If you need web browsing you can set up a filtered proxy server. If you need email, you can set up an internal SMTP server.
That is the way most businesses handle it.
To: ShadowAce
29
posted on
12/06/2008 5:32:32 PM PST
by
rabscuttle385
("If this be treason, then make the most of it!" —Patrick Henry)
To: Swordmaker
I knew his brothers, Wackoof and Jackoff!
30
posted on
12/06/2008 6:10:06 PM PST
by
Doc Savage
("Are you saying Jesus can't hit a curve ball? - Harris to Cerrano - Major League)
To: Swordmaker
31
posted on
12/06/2008 6:22:31 PM PST
by
dangerdoc
(dangerdoc (not actually dangerous any more))
To: proxy_user
"If you need web browsing you can set up a filtered proxy server. If you need email, you can set up an internal SMTP server."That's what we do. We also use firewalls. Malware still sometimes gets through via Internet Explorer.
32
posted on
12/06/2008 7:10:30 PM PST
by
KoRn
To: driftdiver
Um, you can’t give your account root level privs in the GUI, and hacking your account in terminal is a big pain. Not on a Mac, sorry.
33
posted on
12/06/2008 7:27:21 PM PST
by
Spktyr
(Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
To: KoRn
Another approach might be to separate servers from clients. Keep your patient data on Unix machines with no GUI. Access it from Windows, or better yet, use thin clients. These might have a web browser, but it would run on a Unix box and be served remotely over the network.
This would be more economical and more secure, and is one of the newer approaches to IT architecture aimed at businesses where security is more important than convenience.
Of course, workers might complain about not being able to goof off. You’d have to tell them that the computers are for work.
Comment #35 Removed by Moderator
To: Spktyr
” hacking your account in terminal is a big pain. “
FOR YOU MAYBE, BUT NOT FOR SOMEONE THAT KNOWS WHAT THEY ARE DOING.
36
posted on
12/06/2008 8:23:26 PM PST
by
Sunnyflorida
(Unless you are nice and thoughtful you will be ignored. Write in Thomas Sowell.)
To: KoRn
” I found a key logger running on a registration computer. “
Save your breath. “You have no privacy, get over it.” S McNealy.
37
posted on
12/06/2008 8:25:44 PM PST
by
Sunnyflorida
(Unless you are nice and thoughtful you will be ignored. Write in Thomas Sowell.)
To: Sunnyflorida
NICE CAPS.
Then tell us how it’s done in Mac OS X 10.5.5.
38
posted on
12/06/2008 8:27:25 PM PST
by
Spktyr
(Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
To: Sunnyflorida
Oh, and before you flip the “what, you don’t know either?” back at me, I already have the tech note up on my screen.
Here’s a hint - root is turned off by default.
39
posted on
12/06/2008 8:29:11 PM PST
by
Spktyr
(Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
Comment #40 Removed by Moderator
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-60, 61-73 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson