pending deletion

Discussion in 'Wasteland' started by afiowa, Aug 5, 2010.

Thread Status:
Not open for further replies.
  1. macrumors newbie

    Joined:
    Aug 5, 2010
  2. macrumors 6502

    Tower-Union

    Joined:
    May 6, 2009
  3. macrumors Core

    miles01110

    Joined:
    Jul 24, 2006
    Location:
    The Ivory Tower (I'm not coming down)
    #3
    The one that isn't connected to the internet, or the one that never has a human interact with it ever.
     
  4. macrumors 65816

    lionheartednyhc

    Joined:
    Jul 13, 2009
  5. thread starter macrumors newbie

    Joined:
    Aug 5, 2010
    #5
    ...

    1.) It requires human interaction with the internet.

    2.) That's about it..

    I realize bothe systems have their vulnerabilities, but which one is the hardest to break into? I need a secure box for sensitive file storage but it has to be connected to the internet.
     
  6. macrumors 68000

    Joined:
    Dec 22, 2007
    #6
    Either. No one cares how you hide your porn.
     
  7. thread starter macrumors newbie

    Joined:
    Aug 5, 2010
    #7
    Glad to see this place is so welcoming. No wonder everyone on the pc forums hates mac users... where can I find an unbiased answer?
     
  8. macrumors G4

    flopticalcube

    Joined:
    Sep 7, 2006
    Location:
    In the velcro closure of America's Hat
    #8
    They (Windows 7, OSX 10.6) are both difficult to get into. OSX has the benefit of not being as big a target so the "glory" of breaking it is not so great.
     
  9. macrumors 603

    Joined:
    Aug 9, 2009
    #9
    Please post all your requirements.

    Who manages the server? What is their experience in managing secure servers?

    How sensitive are the files? Does someone get embarrased if they leak, or does someone lose money, or does someone die?

    What's your experience in setting up secure file storage? Seriously, if you don't know what you're doing, it really won't matter which system you use, because you can still bungle something that kills your security.

    What kind of human interaction? Web browser access, or do the users have a specific application that you control?

    Security isn't all-or-nothing, unless it's been botched (then it's nothing). Defense in depth.
     
Thread Status:
Not open for further replies.

Share This Page