You are not logged in. Login Now
 0-24   25-29         
 
Author Message
5 new of 29 responses total.
mtp
response 25 of 29: Mark Unseen   Apr 26 06:47 UTC 1992

I understand now.  I also agree that the most secure approach to the problem
would be to implement a hardware lock.  But as you've pointed out - simple
locks would need to be reset physically by a technician.  Additionally,
you have the problem of a wide variety of products to be protected:
notebooks, 286s, 386s, 486s.  So a simple BIOS swap would be ruled out
because it would be difficult to keep up with the diferrent chipsets
that are constantly thrown at you.  Cost would also be a factor - no
matter how you aquire the BIOS (in house programming or custom AMI, Award,
or Pheonix BIOSs) your cost would be too much time and money.  I might as well

kiss my profit good-bye.

As far as your 50% effectiveness estimate regarding software security. I
believe you over estimate the powers of most end users.  There are more
users who don't know what a BIOS or a partition is than those who do.  Even if
they or someone they know *DO* know about these things, there are enough
pitfalls that can be included in the design to foil most attempts to defeat
the security.  It would also be possible for me to know when such an effort
had been made (when the user calls with a down computer).  The system I have
in place now has not been broken by any one of several users.

Which brings me back to my original request.  If anyone can help me do this
"CHAIN" or "CALL" maneuver within an MS DOS 5.0 config.sys file, I can be
free to use this operating system.  I currently require DR DOS 6.0 to round
out the security features I've implemented.  
mcnally
response 26 of 29: Mark Unseen   May 1 05:16 UTC 1992

  What happens with your password scheme if the person just leaves
the PC on all the time?  Does the password expire and the disk
turn into a pumpkin at the stroke of midnight?  What if they're in
the middle of a write?  But if not, your scheme isn't terribly effective
until the next time they reboot, is it?
mtp
response 27 of 29: Mark Unseen   May 1 16:44 UTC 1992

The scheme waits until the user exits one application and tries
to start another before the system "turns into a pumpkin."
There are also seven days of polite reminders to get a new access
code before anything drastic occurs.  Once locked out, the user
can get back into the system with an access code (there is no
damage done to the data on the drive). 
goose
response 28 of 29: Mark Unseen   May 7 13:27 UTC 1992

Can we quit arguing over the guys tactics and just give him an answer?
Sheesh.

mtp
response 29 of 29: Mark Unseen   May 7 15:51 UTC 1992

Here here!
 0-24   25-29         
Response Not Possible: You are Not Logged In
 

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss