{"id":28213,"date":"2007-01-31T10:00:01","date_gmt":"2007-01-31T10:00:01","guid":{"rendered":"https:\/\/blogs.msdn.microsoft.com\/oldnewthing\/2007\/01\/31\/crackpots-in-computer-security-a-complete-solution-to-computer-security\/"},"modified":"2007-01-31T10:00:01","modified_gmt":"2007-01-31T10:00:01","slug":"crackpots-in-computer-security-a-complete-solution-to-computer-security","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/oldnewthing\/20070131-01\/?p=28213","title":{"rendered":"Crackpots in computer security: A complete solution to computer security"},"content":{"rendered":"<p>Now that computer security grabs headlines, the crackpots are drawn to it. This means that the security folks are innundated with dubious vulnerability reports and revolutionary computer designs.\n Today&#8217;s story is one of the &#8220;revolutionary computer designs&#8221; category.<\/p>\n<blockquote class=\"m\"><p>  I have developed a complete solution to computer security. <\/p>\n<p> Construct one case but with two CPUs inside. Each CPU gets its own hard disk, keyboard port, monitor port, mouse port, <i>etc<\/i>. You also have a keyboard, mouse, and monitor with two cables, one that goes to the first CPU&#8217;s I\/O ports and another that goes to the second CPU&#8217;s I\/O ports. <\/p>\n<p> You then designate on of the CPUs the &#8220;fun&#8221; computer and let it connect to the Internet, play games, download software, all that fun reckless stuff. You designate the other CPU as the &#8220;safe&#8221; computer, which is where you do your personal finance and save your sensitive information. <\/p>\n<p> There you have it. A way people can surf the web without compromising their sensitive data. I&#8217;m willing to grant Microsoft a license to use this revolutionary new computer design. <\/p>\n<\/blockquote>\n<p> (The actual proposal was much longer and more convoluted.)<\/p>\n<p> Once you untangle the proposal, it just boils down to using a KVM switchbox to switch between two computers. The only &#8220;revolutionary&#8221; bit is that the two computers happen to share a single case. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Now that computer security grabs headlines, the crackpots are drawn to it. This means that the security folks are innundated with dubious vulnerability reports and revolutionary computer designs. Today&#8217;s story is one of the &#8220;revolutionary computer designs&#8221; category. I have developed a complete solution to computer security. Construct one case but with two CPUs inside. [&hellip;]<\/p>\n","protected":false},"author":1069,"featured_media":111744,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[26],"class_list":["post-28213","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-oldnewthing","tag-other"],"acf":[],"blog_post_summary":"<p>Now that computer security grabs headlines, the crackpots are drawn to it. This means that the security folks are innundated with dubious vulnerability reports and revolutionary computer designs. Today&#8217;s story is one of the &#8220;revolutionary computer designs&#8221; category. I have developed a complete solution to computer security. Construct one case but with two CPUs inside. [&hellip;]<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/posts\/28213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/users\/1069"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/comments?post=28213"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/posts\/28213\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/media\/111744"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/media?parent=28213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/categories?post=28213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/tags?post=28213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}