<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: 8 Steps to Securing a Public Machine</title>
	<atom:link href="http://www.gfi.com/blog/8-steps-securing-public-machine/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/8-steps-securing-public-machine/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=8-steps-securing-public-machine</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Ean L.</title>
		<link>http://www.gfi.com/blog/8-steps-securing-public-machine/comment-page-1/#comment-17410</link>
		<dc:creator>Ean L.</dc:creator>
		<pubDate>Mon, 03 Jan 2011 00:27:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3020#comment-17410</guid>
		<description><![CDATA[I’ve actually run into public use PCs where the employed systems admin runs a restore on all workstations as soon as they’re used. It may seem like a drastic measure on their end, but I also figure it keeps them from doing more costly acts of maintenance should their computers actually be compromised by user error. They’ve managed to design their systems so that system restoration is quick, painless and efficient, so that PCs are up and running in a couple of minutes.]]></description>
		<content:encoded><![CDATA[<p>I’ve actually run into public use PCs where the employed systems admin runs a restore on all workstations as soon as they’re used. It may seem like a drastic measure on their end, but I also figure it keeps them from doing more costly acts of maintenance should their computers actually be compromised by user error. They’ve managed to design their systems so that system restoration is quick, painless and efficient, so that PCs are up and running in a couple of minutes.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Vicky Paige</title>
		<link>http://www.gfi.com/blog/8-steps-securing-public-machine/comment-page-1/#comment-17072</link>
		<dc:creator>Vicky Paige</dc:creator>
		<pubDate>Tue, 28 Dec 2010 07:19:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3020#comment-17072</guid>
		<description><![CDATA[Not to veer too far off topic or anything, but I am curious on how the popularity of netbooks has affected the prevalence of public use computers now that netbooks are, definitely, more affordable than ever before. I see more and more places offering wireless connectivity since most people nowadays bring their own laptop or netbook anyway. 

On a related note, are there any security vulnerabilities when accessing a public network?]]></description>
		<content:encoded><![CDATA[<p>Not to veer too far off topic or anything, but I am curious on how the popularity of netbooks has affected the prevalence of public use computers now that netbooks are, definitely, more affordable than ever before. I see more and more places offering wireless connectivity since most people nowadays bring their own laptop or netbook anyway. </p>
<p>On a related note, are there any security vulnerabilities when accessing a public network?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Wanda</title>
		<link>http://www.gfi.com/blog/8-steps-securing-public-machine/comment-page-1/#comment-15578</link>
		<dc:creator>Wanda</dc:creator>
		<pubDate>Sat, 11 Dec 2010 18:15:22 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3020#comment-15578</guid>
		<description><![CDATA[I completely agree that physical security should be the utmost priority in securing and working on a public PC. With remote access to the PC being readily available to the public, it&#039;ll be hard enough to try to traffic the varied number of users, even more so the kind, type and amount of data being installed, used and retrieved from the unit. Having a separate USB cable to manage public devices is always a good idea.]]></description>
		<content:encoded><![CDATA[<p>I completely agree that physical security should be the utmost priority in securing and working on a public PC. With remote access to the PC being readily available to the public, it&#8217;ll be hard enough to try to traffic the varied number of users, even more so the kind, type and amount of data being installed, used and retrieved from the unit. Having a separate USB cable to manage public devices is always a good idea.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/8-steps-securing-public-machine/comment-page-1/#comment-14782</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Thu, 02 Dec 2010 10:21:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3020#comment-14782</guid>
		<description><![CDATA[That&#039;s a very valid point Sue. I guess that happens because people are used to that at home so the same behavior continues in public places too.

In any case your suggestion for systems to log off automatically after a short period is definitely a very good one and actually deserved to be in the list above! Thanks a lot for pointing it out]]></description>
		<content:encoded><![CDATA[<p>That&#8217;s a very valid point Sue. I guess that happens because people are used to that at home so the same behavior continues in public places too.</p>
<p>In any case your suggestion for systems to log off automatically after a short period is definitely a very good one and actually deserved to be in the list above! Thanks a lot for pointing it out</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Sue Walsh</title>
		<link>http://www.gfi.com/blog/8-steps-securing-public-machine/comment-page-1/#comment-14689</link>
		<dc:creator>Sue Walsh</dc:creator>
		<pubDate>Wed, 01 Dec 2010 04:06:40 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3020#comment-14689</guid>
		<description><![CDATA[Smart, common sense advice. What concerns me is how many people use public machines to log into their social networking account or check their email, and then walk away without logging off. Public machines need some kind of software that automatically logs someone off after a pre-determined period of non-activity.]]></description>
		<content:encoded><![CDATA[<p>Smart, common sense advice. What concerns me is how many people use public machines to log into their social networking account or check their email, and then walk away without logging off. Public machines need some kind of software that automatically logs someone off after a pre-determined period of non-activity.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 16:25:36 by W3 Total Cache --