First page Back Continue Last page Summary Graphics
Example application
Covert communications
- Configure user Ids (2 min)
- Network configuration (20 sec)
- Sshd startup (20 sec)
- Ssh in and "see/say"
- Power off and all is lost (5 sec)
Rapid firewall (3-5 minutes typical)
- Pop up box w/pre-configured firewall
- Enter a few Ips and network numbers
- Store on floppy (WO), reboot, done
Notes: