Path: utzoo!attcan!utgpu!jarvis.csri.toronto.edu!mailrus!iuvax!uxc.cso.uiuc.edu!uxc.cso.uiuc.edu!m.cs.uiuc.edu!p.cs.uiuc.edu!gillies
From: gillies@p.cs.uiuc.edu
Newsgroups: comp.sys.next
Subject: Re: Student's view of NeXT marketing pl
Message-ID: <116900006@p.cs.uiuc.edu>
Date: 10 Aug 89 14:15:00 GMT
References: <4866@tank.uchicago.edu>
Lines: 12
Nf-ID: #R:tank.uchicago.edu:4866:p.cs.uiuc.edu:116900006:000:566
Nf-From: p.cs.uiuc.edu!gillies    Aug 10 09:15:00 1989


Actually, I've been thinking a little bit about NeXT security.

If your site can guarantee that nobody boots a rogue disk from another
college, then you should be secure.  The basic security measure is the
optical disk, WHICH CANNOT BE READ OR WRITTEN BY ANY OTHER COMPUTER OR
DISK DRIVE.  Thus, if you can keep students from using non-standard
optical disks (e.g. hacked up by a student who has root access to his
NeXT machine at home), then you can control network access and a host
of other things.

Now if NeXT would only provide a way to maintain this security.