A way to monitor your files
Doug Gwyn
gwyn at smoke.BRL.MIL
Sun Sep 10 21:34:15 AEST 1989
In article <1142 at virtech.UUCP> cpcahil at virtech.UUCP (Conor P. Cahill) writes:
>Yes. I did not intend to say that C2 is the solution to the problem with
>the superuser, but further levels of security (possibly B1, but more
>probably B2) will begin to dispense with the idea of an omnipotent being.
And then the sysadm will merely shut down the system, boot up his
browser, and examine files on the supposedly secure disk.
Nothing short of an excellent encryption scheme will foil the
determined snooper in a situation like the one we were discussing.
More information about the Comp.unix.questions
mailing list