The 'Security Digest' Archives (TM)

Archive: About | Browse | Search | Contributions | Feedback
Site: Help | Index | Search | Contact | Notices | Changes

ARCHIVE: Rutgers 'Security List' (incl. - Archives (1987)
DOCUMENT: Rutgers 'Security List' for June 1987 (3 messages, 1286 bytes)
NOTICE: recognises the rights of all third-party works.


From:      <>   4-Jun-1987 22:30:31
Science marches forward:

A piece of high-temperature superconductor would repel
all the tumblers.

A magnetic metal with a low (but above room temperature)
Curie point could be heated to above the Curie point,
inserted into the slot, and allowed to cool.  It would
then carry a "negative" field of the correct key.  You'd
have to reverse the polarity of each magnetized region.

Gee, what fun.
			Matt Crawford
From:      Chris Miller <>   11-Jun-1987 11:52:12
To:        security@RUTGERS.EDU
References request :

I am currently researching a PhD in computer security at Heriot-Watt University,
Edinburgh,Scotland. My main topic is formal models and their representation
as logical rules in an expert system or logic database.

At this time I am still reviewing the literature in the field, and as such
I would be extremely grateful for any information/reference list or
conference proceedings that readers can recommend. 

Many thanks.

David J Ferbrache                   |                                       |
Heriot-watt university              | JANET :            |
Dept of Computer Science            | UUCP  :            |
79 Grassmarket                      | TELE  : (UK) 31-225-6465 ext 553      |
Edinburgh   EH1 2HJ                 |                                       |
Scotland.                           |                                       |

From: (C-234)  24-Jun-1987 15:47:24
To:        Security@RUTGERS.EDU
	I am looking for a copy of the source code (online) for a set of
security auditing programs as described and listed in the book "UNIX
SYSTEM SECURITY" by Wood and Kochan. Could you provide me with this software
or point me to who could? I would rather not type in 20 pages of code if
I could help it. Also if there are any other Unix security programs
which might be of interest, please let me know.
	Thanks for your time,
		Jim Kohl
		Mathematics and Computer Science Division
		Argonne National Laboratory