SCIENTIFIC-LINUX-USERS Archives

April 2017

SCIENTIFIC-LINUX-USERS@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Konstantin Olchanski <[log in to unmask]>
Reply To:
Konstantin Olchanski <[log in to unmask]>
Date:
Fri, 31 Mar 2017 22:31:27 -0700
Content-Type:
text/plain
Parts/Attachments:
text/plain (21 lines)
On Fri, Mar 31, 2017 at 07:10:22PM -0700, jdow wrote:
> 
> That's why I pictured IT plus other corporate authorities. When you
> compromise security on a company's network you give away the keys to
> the corporate kingdom. That can, has, and should lead to a firing.
>
> Having a password that doesn't meet spec is a whole different
> ballgame.
>

None of this makes sense. Installing a wifi hotspot in a locked
room in a locked building (where it cannot possibly be accessed
by unauthorised people) is a firing offense but using the same
password for root and for yahoo is ok (or just a slap on the wrist).

-- 
Konstantin Olchanski
Data Acquisition Systems: The Bytes Must Flow!
Email: olchansk-at-triumf-dot-ca
Snail mail: 4004 Wesbrook Mall, TRIUMF, Vancouver, B.C., V6T 2A3, Canada

ATOM RSS1 RSS2