Path: utzoo!attcan!utgpu!jarvis.csri.toronto.edu!mailrus!iuvax!uxc.cso.uiuc.edu!uxc.cso.uiuc.edu!m.cs.uiuc.edu!p.cs.uiuc.edu!gillies From: gillies@p.cs.uiuc.edu Newsgroups: comp.sys.next Subject: Re: Student's view of NeXT marketing pl Message-ID: <116900006@p.cs.uiuc.edu> Date: 10 Aug 89 14:15:00 GMT References: <4866@tank.uchicago.edu> Lines: 12 Nf-ID: #R:tank.uchicago.edu:4866:p.cs.uiuc.edu:116900006:000:566 Nf-From: p.cs.uiuc.edu!gillies Aug 10 09:15:00 1989 Actually, I've been thinking a little bit about NeXT security. If your site can guarantee that nobody boots a rogue disk from another college, then you should be secure. The basic security measure is the optical disk, WHICH CANNOT BE READ OR WRITTEN BY ANY OTHER COMPUTER OR DISK DRIVE. Thus, if you can keep students from using non-standard optical disks (e.g. hacked up by a student who has root access to his NeXT machine at home), then you can control network access and a host of other things. Now if NeXT would only provide a way to maintain this security.