Berkeley CSUA MOTD:Entry 14493
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2024/11/27 [General] UID:1000 Activity:popular
11/27   

1998/8/21-22 [Computer/SW/Security] UID:14493 Activity:very high
8/21    My supervisor asked that everyone in the office release their
        e-mail password to her.  I don't feel comfortable doing that, and
        was wondering if there is some sort of UCB e-mail policy about
        not releasing passwords that I can quote in response to her request.
        \_ Your boss has no right to require that you give them your
           password.  root has the right to have full access to your
           account but that's a different story.  Don't do it.  Tell him
           shoove it up his ass if he forces you to.
                \_ root has the ability, but not necessarily the right, to
                   full access to your account.  (If at a UC or ISP, root
                   is prohibited from reading your e-mail for instance.)
        \_ Just say "NO WAY IN HELL"
           \_ You are F..I..R..E..D!!!! (do I smell million dallar law
              suit?)
        \_ Is it your personal email account or work account?  Either one,
           you have to right to not to.  You should ask her her reason for
           knowing password.
                \_ It is my csua account which I also use for work.  What
                   I am looking for is some sort of csua or ucop rule that
                   says I am not obligated to give her my password.
                        \_ CSUA policy forbids you from allowing anyone
                           else to have your password or use your account.
                           If she wants a password to your work e-mail,
                           make her give you a work e-mail account. --root
                           \_ in fact CSUA root will turn your account off
                              should we find that this is the case. --jon
        \_ Employers have a legal right to access to your office workstation
           and business related accounts.  That does not extend outside the
           office.  Forward your mail outside and tell her to shove it.
           If they forbid you from forwarding your mail outside the company,
           be very careful what email you do with your business address.  BIG
                      UC Policies. --jon
           BOSS is WAtching YOU. -ERic
                \_ But the UC/UCB e-mail policy protects the privacy of
                   UC employee e-mail - see
                        http://socrates.berkeley.edu:7015/policy
                        \_ Your *e-mail* is protected, but your *password* is
                           not.  In fact there is a campus policy that
                           your supervisor *must* have all the passwords you
                           use for business purposes (if you're UC staff).
                           They just can't look at it except under the
                           situations outlined in the e-mail and other
                           policies.  -tom
                           \_ No, root never knows what your passwords
                              are. Having passwords stored anywhere on a
                              computer comprimises security.  Passwords on
                              /etc/passwd or /etc/shadow are one way
                              encrypted so there's no way to derive
                              the original passwords without a password
                              cracker and a high performance computer.
                                                \_ A 386 is powerful enough
                                                   to crack many passwords.
                                \_ I didn't say root, I said "your
                                   supervisor".  -tom
                   \_ Boy imagine that, UC managers who do not understand
                      or are not aware of UC Policies. --jon
                      btw, if you want a wider discussion, there is also
                      http://ucb.net.discussion.  I am sure some of the more
                      security minded denizens of that newsgroup will have
                      some interesting opinions on this topic.
                  \_ Well its nie the the UC at least grants some expectation
                      of privacy to employee email.  I'm just pointing out that
                      in the 'real world' of employment, it can be very
                      different. -ERic
        \_ I think she likes you!
          \_ I think so too!!
                \_ She's married and I'm a girl.  Hence, I don't think so.
                        \_ She could be bisexual.
                        \_ How about giving me your password.  I am not married
                           and I am a guy and not gay.
                  \_ which company is this?
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2024/11/27 [General] UID:1000 Activity:popular
11/27   

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/9/20-11/7 [Computer/SW/Unix, Finance/Investment] UID:54482 Activity:nil
9/20    How do I change my shell? chsh says "Cannot change ID to root."
        \_ /usr/bin/chsh does not have the SUID permission set. Without
           being set, it does not successfully change a user's shell.
           Typical newbie sys admin (on soda)
           \_ Actually, it does: -rwsr-xr-x 1 root root 37552 Feb 15  2011 /usr/bin/chsh
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
Cache (13 bytes)
socrates.berkeley.edu:7015/policy -> socrates.Berkeley.EDU:7015/policy/
References 1.
Cache (10 bytes)
ucb.net
Index of /