|
|
ARCHIVE: Rutgers 'Security List' (incl. misc.security) - Archives (1987)
DOCUMENT: Rutgers 'Security List' for June 1987 (3 messages, 1286 bytes)
SOURCE: http://securitydigest.org/exec/display?f=rutgers/archive/1987/06.txt&t=text/plain
NOTICE: securitydigest.org recognises the rights of all third-party works.
START OF DOCUMENT
-----------[000000][next][prev][last][first]---------------------------------------------------- From: <matt@oddjob.uchicago.edu> 4-Jun-1987 22:30:31 To: security@red.rutgers.edu
Science marches forward: A piece of high-temperature superconductor would repel all the tumblers. A magnetic metal with a low (but above room temperature) Curie point could be heated to above the Curie point, inserted into the slot, and allowed to cool. It would then carry a "negative" field of the correct key. You'd have to reverse the polarity of each magnetized region. Gee, what fun. Matt Crawford
-----------[000001][next][prev][last][first]---------------------------------------------------- From: Chris Miller <chris%cs.heriot-watt.ac.uk@cs.ucl.ac.uk> 11-Jun-1987 11:52:12 To: security@RUTGERS.EDU
References request : I am currently researching a PhD in computer security at Heriot-Watt University, Edinburgh,Scotland. My main topic is formal models and their representation as logical rules in an expert system or logic database. At this time I am still reviewing the literature in the field, and as such I would be extremely grateful for any information/reference list or conference proceedings that readers can recommend. Many thanks. ----------------------------------------------------------------------------- David J Ferbrache | | Heriot-watt university | JANET : davidf@uk.ac.hw.cs | Dept of Computer Science | UUCP : davidf@cs.hw.ac.uk | 79 Grassmarket | TELE : (UK) 31-225-6465 ext 553 | Edinburgh EH1 2HJ | | Scotland. | |
-----------[000002][next][prev][last][first]---------------------------------------------------- From: kohl@anl-mcs.arpa (C-234) 24-Jun-1987 15:47:24 To: Security@RUTGERS.EDU
Greetings: I am looking for a copy of the source code (online) for a set of security auditing programs as described and listed in the book "UNIX SYSTEM SECURITY" by Wood and Kochan. Could you provide me with this software or point me to who could? I would rather not type in 20 pages of code if I could help it. Also if there are any other Unix security programs which might be of interest, please let me know. Thanks for your time, Jim Kohl Mathematics and Computer Science Division Argonne National Laboratory (kohl@anl-mcs.arpa)
END OF DOCUMENT
ISSN 1742-948X 01 (Online) | 2005/03/01 | Copyright 2002-2008 securitydigest.org. All rights reserved. |