Comment Re:Why can't more public terminals just use Ghost? (Score 1) 383
Since I have been there, Aug. 2000, Cornell has been using PC-Rdist.
This is a very good set forward, but how do you know that the re-imaging software hasn't been compromised?
Futhermore, you can install stuff after the PC gets re-imaged and reboots because when it starts back up, it sits already logged into windows with a pop-up saying that it has booted cleanly. Anyone can install a keylogger, and by not closing that window and leaving the mouse cursor in the center of the screen, it would appear that no on has done anything since the clean boot, but it still limits the the damage a s/w keylogger can do.
This is a very good set forward, but how do you know that the re-imaging software hasn't been compromised?
Futhermore, you can install stuff after the PC gets re-imaged and reboots because when it starts back up, it sits already logged into windows with a pop-up saying that it has booted cleanly. Anyone can install a keylogger, and by not closing that window and leaving the mouse cursor in the center of the screen, it would appear that no on has done anything since the clean boot, but it still limits the the damage a s/w keylogger can do.