Viewing 11 posts - 1 through 11 (of 11 total)
The physical access to our company's entire data centre will soon be controlled by a biometric system. Curious that we should be willing to trust physical access to biometrics, but...
November 9, 2010 at 5:10 pm
Now I'm really confused. You're stating that your fingerprint product isn't suitable for security, except where the data it's protecting doesn't matter?
It's a time clock. People punch in...
November 9, 2010 at 5:02 pm
I know what deterministic means.
So what you're saying is that you're an industry insider who knows that there's a huge security flaw in the product your company sells, and you're...
November 9, 2010 at 3:51 pm
Actually, fingerprints are done as vector graphics, essentially. They work on points on curves, which are mathematically described, not on bitmapping (like a JPG). At least, the applications...
November 9, 2010 at 2:15 pm
Fingerprints are passwords. They're both just data to a CPU. The rules for one are the rules for the other.
Fingerprints are non-deterministic passwords.
The hash of the string "Spongebob"...
November 9, 2010 at 1:15 pm
the fingerprint software must have saved an unencrypted version of the key material (i.e. your password) somewhere in order to present it to the OS and log you in when...
November 9, 2010 at 12:54 pm
Fingerprint security on a laptop is relative to the value of whatever data is on the laptop. It is perfect security for a laptop that contains nothing of significant...
November 9, 2010 at 10:30 am
Dictionary words aren't as secure as you make them out to be. A dictionary word has far less entropy than a random sequence of characters, hence the concept of...
November 8, 2010 at 11:46 am
I used the password safe in the past, but became spooked by the idea that anyone who puts a keylogger on my machine would be able to acquire every single...
November 8, 2010 at 10:53 am
I am clearly a latecomer to this thread, but there is one vital thing that needs to be considered as well. Does the disk subsystem use disk mirroring? ...
May 12, 2010 at 9:50 am
To me, parts of several answers would make sense.
IF this happened to me, I would first restore the whole database appending _old, and then restore the transaction logs to just...
July 14, 2008 at 3:08 pm
Viewing 11 posts - 1 through 11 (of 11 total)