home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Big Blue Disk 31
/
bbd31.zip
/
DISKOVER.TXT
< prev
next >
Wrap
Text File
|
1989-03-07
|
3KB
|
59 lines
|A╔════════════════════╗════════════════════════════════════╔════════════════════╗
|A║ ^0First Things First |A║═════════════ ^1Diskovery |A════════════║ ^0First Things First |A║
|A╚════════════════════╝════════════════════════════════════╚════════════════════╝
^Cby
^CBob Napp
^1What price security?^0
Although I would like to believe we don't need to concern ourselves about a
subject like this, daily I am reminded that this is not true. I'm old enough
to remember the time when it was common to walk off and leave your car or your
house unlocked, but today, it's a different story. Privacy is a thing of the
past!
How do you protect yourself? Well, for starters, you take the typical
precautions of locking your car and home! I've become so used to doing this
that I feel uncomfortable if I don't. That takes care of most of the material
things, what else . . . ?
Success or failure, in today's society, is based upon who gets what
information and when they get it. Corporate mergers, bank transfers, and even
credit card accounts can all be affected by accessibility to this type of
knowledge. What do all these activities have in common? At one time or
another critical information about each was stored in a computer.
Now wait a minute! Computers are our friends . . . right? Actually, that
is the problem. They are your friend, my friend, and a friend to anybody else
that happens along. The point is that an unattended computer represents an
open door to anyone with the ability and the desire to seek the information
contained within. This information can be anything from your personal credit
card numbers to a memo you write that is critical of your co-workers. Let this
stuff get in the wrong hands and there will be heck to pay!
It is not my intention to scare you, but to remind you that not everything
you hold dear is material. You don't tell everything ^1you^0 know, why should
your computer? Take every opportunity to keep your thoughts, credit card
numbers, home inventory, and anything else you may have stored in your computer
secure. The question isn't what price security, but what is the cost without!
^1News From Big Blue Disk^0
Many of you will notice that we are not using our menu on disk #2 of this
issue of Big Blue Disk. Let me assure you that it was intentional and will
not be a common occurrence. We had an opportunity to publish a piece of
software we felt would hold a fairly wide appeal. The only problem with this
program is that it is so large we are unable to include our menu system on the
disk with it. We hope that you enjoy Moraff's Revenge and will understand that
our desire to bring you the best in software will sometimes require us to do
things we would rather not!
I want to thank everyone for sending in the Report Cards. You have
provided us with many helpful suggestions. I would like to strongly recommend
that you do not include requests for the Video Utilities Disk or replacements
for defective disks on a Report Card. Because of the manner in which we
process this information, it may be several weeks before we are able to fill
your request. Instead, if you will address those requests to me or our
Circulation Department we will be able to fill them much more quickly!