This may be a dumb question, but here goes.
With the proliferation of USB thumb drives that allow you to have an operating system on them, what's to stop somebody from sticking one in a networked computer and using his operating system to bypass security policies on the domain. For instance, we block access to the run command. What's to stop them from putting XP on the flash drive and running it from there?
With the proliferation of USB thumb drives that allow you to have an operating system on them, what's to stop somebody from sticking one in a networked computer and using his operating system to bypass security policies on the domain. For instance, we block access to the run command. What's to stop them from putting XP on the flash drive and running it from there?