On Tue, 12 Oct 1999 John_White at dell.com wrote:
> What about the Star Trek approach . . . .
> A sensitive piece of data is protected by 5 passwords,
> any 3 of which will allow access.
> Anyone know of a real world implementation of this ?
Well I wouldn't use Star Trek as a security model - their security is so
bad that it is clear it is based on Windows 95 (definitely not even NT)
type technology. 
What I would suggest is sealing the envelopes and then handing them to a
solicitor or bank for holding - to be opened only in the event of a
Don't simply put them in the boss's safe unless you want the boss's
secretary to have root on your machine.
 I will discuss this if required.
Thomas Bridge Senior Hostmaster/Sysadmin, VIA NET.WORKS Ireland.
thomas.bridge at via-net-works.ie
"Some people have told me they don't think a fat penguin really embodies
the grace of Linux, which just tells me they have never seen a angry
penguin charging at them in excess of 100mph. They'd be a lot more
careful about what they say if they had." - Linus Torvalds
Maintained by the ILUG website team. The aim of Linux.ie is to
support and help commercial and private users of Linux in Ireland. You can
display ILUG news in your own webpages, read backend
information to find out how. Networking services kindly provided by HEAnet, server kindly donated by
Dell. Linux is a trademark of Linus Torvalds,
used with permission. No penguins were harmed in the production or maintenance
of this highly praised website. Looking for the
Indian Linux Users' Group? Try here. If you've read all this and aren't a lawyer: you should be!