Ahouxt.193
net.general,net.unix-wizards
utcsrgv!utzoo!decvax!ucbvax!ihnss!houxi!houxt!govern
Thu Mar  4 17:07:18 1982
Security
My deparment does proprietary work, and we are concerned about the security
of our UNIX file systems.   I would very much appreciate if you would try
to steal some of my files  -- I'm not concerned about the details of your method
(yet).   The files are on the houxt machine, which is ucbvax!ihnss!houxt
My login is govern, and the files are:
       /t1/govern/readthese/STEALTHIS1
       /t1/govern/readthese/STEALTHIS2
       /t1/govern/paranoid/STEALTHIS3

About a year ago, we had some concerns about file system security  --
the uux command lets you do some things, and our BLN high-speed network
has more flexibility.  The computer center systems here are fairly
unprotected;  by this I mean we have uucp and BLN available.  Some of the
word processing center systems are no longer on uucp because of this,
and various departments doing sensitive work have their own machines.

I would prefer to keep my own level of paranoia as low as possible,
because enhancing security reduces the flexibility available on the
system.   Thus, I miss having fairly direct access to the WP Center's
files, but they had to be protected.

                       Please steal my files!
                               thanks;  Bill Stewart  ucbvax!ihnss!houxt!govern
                                       or      teklabs!cbosg!ihnss!govern
                                       1-201-577-5122
                               Bell Labs  FJ 1C-112,  Freehold NJ.

-----------------------------------------------------------------
gopher://quux.org/ conversion by John Goerzen <[email protected]>
of http://communication.ucsd.edu/A-News/


This Usenet Oldnews Archive
article may be copied and distributed freely, provided:

1. There is no money collected for the text(s) of the articles.

2. The following notice remains appended to each copy:

The Usenet Oldnews Archive: Compilation Copyright (C) 1981, 1996
Bruce Jones, Henry Spencer, David Wiseman.