PDA

View Full Version : pending deletion


afiowa
Aug 5, 2010, 03:56 PM
Pending deletion

Tower-Union
Aug 5, 2010, 04:01 PM
Neither.

http://en.wikipedia.org/wiki/OpenBSD#Security_and_code_auditing

miles01110
Aug 5, 2010, 04:06 PM
The one that isn't connected to the internet, or the one that never has a human interact with it ever.

lionheartednyhc
Aug 5, 2010, 04:21 PM
The one over there. *points*

afiowa
Aug 5, 2010, 04:27 PM
...

1.) It requires human interaction with the internet.

2.) That's about it..

I realize bothe systems have their vulnerabilities, but which one is the hardest to break into? I need a secure box for sensitive file storage but it has to be connected to the internet.

ethical
Aug 5, 2010, 04:46 PM
...

1.) It requires human interaction with the internet.

2.) That's about it..

I realize bothe systems have their vulnerabilities, but which one is the hardest to break into? I need a secure box for sensitive file storage but it has to be connected to the internet.

Either. No one cares how you hide your porn.

afiowa
Aug 5, 2010, 04:49 PM
Glad to see this place is so welcoming. No wonder everyone on the pc forums hates mac users... where can I find an unbiased answer?

flopticalcube
Aug 5, 2010, 04:52 PM
They (Windows 7, OSX 10.6) are both difficult to get into. OSX has the benefit of not being as big a target so the "glory" of breaking it is not so great.

chown33
Aug 5, 2010, 05:10 PM
...

1.) It requires human interaction with the internet.

2.) That's about it..

I realize bothe systems have their vulnerabilities, but which one is the hardest to break into? I need a secure box for sensitive file storage but it has to be connected to the internet.

Please post all your requirements.

Who manages the server? What is their experience in managing secure servers?

How sensitive are the files? Does someone get embarrased if they leak, or does someone lose money, or does someone die?

What's your experience in setting up secure file storage? Seriously, if you don't know what you're doing, it really won't matter which system you use, because you can still bungle something that kills your security.

What kind of human interaction? Web browser access, or do the users have a specific application that you control?

Security isn't all-or-nothing, unless it's been botched (then it's nothing). Defense in depth.