Also.... "loaned" to a museum? For crying out loud, why? Give it to them, sell it to them, or whatever...
The reason is very simple. If you loan it to them then they can't turn around and sell the parts off to make money (fund raising) or decide its not worth the time and just throw it away or do anything that might destroy it. You will basically not get it back unless they say they no longer want it, then you find another museum who might want it.
A firewall won't prevent your ISP from telling advertisers that you like to google Nike shoes and them then targeting you with advertisements...
No, but https://encrypted.google.com/ will. Not the best solution but hey, you let Google make money off of you and not your ISP.
For personal use (i.e. free as in beer, and easy) I found that encrypting a drive is much faster than wiping a drive. Take Truecrypt and encrypt the drive with a very long passphrase - 60 to 64 characters. Some software allows you to wipe out the encryption key, basically making the drive a brick - which is a better option (with no key to crack it is almost impossible to recover).
Warren buffet claims that he pays less in taxes than his executive secretary does.
Sure he does - he has many more tax lawyers and accountants then she does - DUH!
If Warren Buffet really wanted the rich to pay more then maybe he should pay all his back tax bills instead of fighting them in court. I mean, I am I the only person who thinks he's being a little bit more than hypocritical when he talks about *the rich* need to pay more taxes when he and his company have teams of accountants and lawyers fighting his tax bills on a regular basis?
I know for certain that if I were to do something like this, I would NOT use an installed operating system, and I would MOST CERTAINLY not use a Windows system! Not even from a public computer, from a library, or senior citizen's center!
1. Use a Windows system
2. Do something like that
3. Boot up to DBAN
Lex: "It's a Unix System, conforming to the Single Unix Specification of the Open Group! Unix is a registered trademark of the Open Group, and not to be used as a generic term! I know this!"
More like: "It's a Unix System, I know this custom program that they were onsite creating (with over a million line of code - for dramatic effect!) and still to this day are debugging, even though the devolopers are not 100% sure how it will act."
That's what I say now whenever asked about any program, no matter how complex or obscure it is as long as it's on Windows... "It's a Windows system... I know this".
Apple is still on safe due to obscurity
No, that is just a false sense of security.
The main advantage is that you are not sharing files. You just choose which ones you want to download. The *AA can't hit you for making them available (hence their bad accounting).
Having said that, yeah, I agree more ISP are not really that secure. They are stuck in the mentality of "the traffic never leaves our network" so they think it is safe. I guess they have never heard of bad employees.
I was going to reply to each of your points but after reading your 2nd point I realized it was not worth it as you would never be able to understand the logic behind corporate governance or IT security policies.
I will, however, leave you with the following since this would be as good a place as ever to try to get you started in the right direction.
It seems that many IT departments see themselves as a law unto themselves, dictating to users what they can and can't do.
No, it's the IT departments job to execute the policies dictated by the executive managment. This is done to better secure the environment.
Pay attention to your customers and give them what they want.
Wrong again (unless you're in sales like you). Give them what they NEED to do their job.
You see things like many IT customers. "You're here to serve me". That is, of course, incorrect. IT is there to serve the business. Hate to tell you, but it really is about more than just you most of the time.
Um, Ben did use a pseudonyms (http://en.wikipedia.org/wiki/Mrs._Silence_Dogood). Granted that was when younger.
He used many...
Silence Dogood, Harry Meanwell, Alice Addertongue, Richard Saunders, and Timothy Turnstone to name a few.