At 16:35 20/02/98 -0800, Dave Crocker wrote:
>At 04:27 PM 2/20/98 -0800, Kent Crispin wrote:
>>Well, there is design, and then there is implementation. What I can
>>speak of with fair authority is the design. But I have not been
>>involved in the implementation, so I do not have first hand knowledge
>>of that. And also, they were still in a test mode...
>
>In early December I got a briefing which showed roles played by a number of
>different machines, including one called firewall. The bottom line is that
>things are very, nicely separated.
>
>The Emergent guys are highly experienced with transactions systems and
>appropriate security issues. (And in case no noticed, I'm not easy to
>please.)
In fact, the machines were stolen by whom? Yes, we should to know how
to make security in phisical...
APJII's office is a concrete block, 3 layers security officer to get into
office.
(just for example).
Best Regards,
Teddy A. Purwadi
APJII, Secretary General
P:+62-21 526 8777
F:+62-21 526 8789
E:sekjen@apjii.or.id
http://www.apjii.or.id
This archive was generated by hypermail 2b29 : Sun Jan 30 2000 - 03:22:25 PST