Beefy Boxes and Bandwidth Generously Provided by pair Networks
Perl Monk, Perl Meditation
 
PerlMonks  

jminieri

by jminieri (Initiate)
on May 29, 2002 at 23:31 UTC ( #170251=user: print w/replies, xml ) Need Help??

Information Security Officer
Bath Iron Works
700 Washington Street
Bath, ME 04530


Author of Net-RDEP, Net-SDEE

Log In?
Username:
Password:

What's my password?
Create A New User
Chatterbox?
[tye]: We use auditd for security monitoring. So we can rely on auditing being enabled. I'm not sure who would want to not be able to audit. Maybe some VM inside another system with audit?
[SuicideJunkie]: spies would want a system to not be able to audit.
[erix]: spies should use a type-writer, no power needed, no auditable
[erix]: if all else fails, eat the paper

How do I use this? | Other CB clients
Other Users?
Others chanting in the Monastery: (4)
As of 2017-06-23 20:17 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?
    How many monitors do you use while coding?















    Results (555 votes). Check out past polls.