Path: utzoo!utgpu!watmath!att!tut.cis.ohio-state.edu!gem.mps.ohio-state.edu!rpi!batcomputer!cornell!vax5!z8my From: z8my@vax5.CIT.CORNELL.EDU Newsgroups: comp.sys.next Subject: Re: Student's view of NeXT marketing pl Message-ID: <19352@vax5.CIT.CORNELL.EDU> Date: 15 Aug 89 00:15:43 GMT References: <4866@tank.uchicago.edu> <116900006@p.cs.uiuc.edu>Sender: news@vax5.CIT.CORNELL.EDU Reply-To: z8my@vax5.cit.cornell.edu (Samuel Paik) Organization: XYNE knowledge structures Lines: 23 In article J Greely writes: >In article <116900006@p.cs.uiuc.edu> gillies@p.cs.uiuc.edu writes: >>Actually, I've been thinking a little bit about NeXT security. > >There are times it's kept me awake nights... >The basic security *problem* is the OD. Cheap, portable disks large >enough to hold a bootable Unix. And don't rely on the obscurity of >the media to protect you. That's fuzzy thinking, considering how fast >CDs have taken over the audio market. I've heard a lot of talk about "security". But it seems to me that this concert is over rated. Consider that personal computers a'la IBM PCs and Macs can be cheaply added to a UNIX style network. Who needs an entire Unix kernal? If you want to make mischief, all you need is a compiler and the opportunity to download one of the several public-domain and freely available tcp/ip packages, like KA9Q, NCSA_Telnet, PCIP, CITI-MACIP... Sam Paik d65y@vax5.cit.cornell.edu p.s. This isn't to say that system security isn't important. I like my files to remain, after my and your mistakes, and malice too...