|
From: Brunk, Kevin <Kevin.Brunk@wabutler.com> > To extend Leif's thought, if you NEED security, don't use a computer about two sunspot cycles ago I was working on a military project concerned with (what in the jargon is called) multi-level security. How to have a top-secret cleared system talk to a system with a lower clearance and things like that. The solution for transferring messages from one system to the other was this: The top-secret system types out the message on a teletype. A security officer reads the message and types it in on a different teletype for transmission to the other system. Security is a human process in the end.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.