Path: utzoo!utgpu!watmath!att!tut.cis.ohio-state.edu!gem.mps.ohio-state.edu!rpi!batcomputer!cornell!vax5!z8my
From: z8my@vax5.CIT.CORNELL.EDU
Newsgroups: comp.sys.next
Subject: Re: Student's view of NeXT marketing pl
Message-ID: <19352@vax5.CIT.CORNELL.EDU>
Date: 15 Aug 89 00:15:43 GMT
References: <4866@tank.uchicago.edu> <116900006@p.cs.uiuc.edu> 
Sender: news@vax5.CIT.CORNELL.EDU
Reply-To: z8my@vax5.cit.cornell.edu (Samuel Paik)
Organization: XYNE knowledge structures
Lines: 23

In article  J Greely  writes:
>In article <116900006@p.cs.uiuc.edu> gillies@p.cs.uiuc.edu writes:
>>Actually, I've been thinking a little bit about NeXT security.
>
>There are times it's kept me awake nights...
>The basic security *problem* is the OD.  Cheap, portable disks large
>enough to hold a bootable Unix.  And don't rely on the obscurity of
>the media to protect you.  That's fuzzy thinking, considering how fast
>CDs have taken over the audio market.

I've heard a lot of talk about "security".  But it seems to me that this
concert is over rated.  Consider that personal computers a'la IBM PCs
and Macs can be cheaply added to a UNIX style network.  Who needs an
entire Unix kernal?  If you want to make mischief, all you need is a
compiler and the opportunity to download one of the several public-domain
and freely available tcp/ip packages, like KA9Q, NCSA_Telnet, PCIP,
CITI-MACIP...

Sam Paik
d65y@vax5.cit.cornell.edu

p.s.  This isn't to say that system security isn't important.  I like
      my files to remain, after my and your mistakes, and malice too...