Cobb's Guide to PC and LAN Sccurity, Part 2 of 3

Total Page:16

File Type:pdf, Size:1020Kb

Cobb's Guide to PC and LAN Sccurity, Part 2 of 3 Chapter Secure Sites Defending Sites and Systems Cobb's Guide to PC & LAN Security, Part 2 of 3 Free Electronic Edition, Creative Commons License, © 1996-2010, Stephen Cobb This chapter deals with hardware-based site and system access controls, covering keys, locks, cards, token-based systems, and biometric authentication. Which of these technologies wdl be appropriate to your needs depends upon the threats that you face, the value of the assets that you are defendmg, and the resources available for that defense. The emphasis is on physical devices for controhng access. In the first in- stance, these are considered in relation to perimeter or site security, which in practi- cal computer-security terms means controlling who is allowed near your systems. Some of the same technology also can be applied to control the use of those sys- tems, allowing or preventing system access. For example, you might have to enter a four-digit access code to enter your office, then insert an ID card into a reader to boot up your personal computer (terms such as ID wdl be defined in a moment). Given the current trend toward system integration in physical security systems, it is conceivable that you would use one card or token to do many things, from entering the parking garage in the morning, opening your office door, booting up your PC and logging onto the company network, buying lunch in the company cafeteria, and checking out of the garage at the end of the day. Securing the Perimeter In chapter 4, I looked at techniques for preventing the theft of computer equipment, whch is an important part of what is calledphysical security. However, physical se- curity also involves regulating who actually uses your computers. Obviously, the in- Secure Sites 217 1. Site access 2. Office access 3. Computer area access B. System admin access Figure 6.1 Diagram of access control. formation on those computers is going to be a lot more secure if you can control who uses them. The security measures employed to accomplish this vary from the obvi- ous and inexpensive to the exotic and expensive. They operate at two levels. First, you need to be able to control who can get near enough to your computers to use them. Then you need to control what anyone who gets close enough can do when they get there (see Figure 6.1). In other words, if you control who can come into the office, you should know all of the potential users. If you further control who can use the computers, you should know who the actual users are. The word "should" is significant in those last two sen- tences for two reasons. First of all, it is important to recognize that access control systems are not 100% effective. Second, the mere fact that you have access controls in place d act as a major deterrent to computer abuse and misuse. The basics of access control Some people credit the Chinese with the first comprehensive access control system. Apparently, around 1000 B.C., the Emperor began to require servants at the Imper- ial Palace to wear rings engraved with intricate designs that identified areas of the palace where they were permitted to enter. The premise of site access control re- mains the same today. organizations of all sizes use such systems to manage access to sensitive areas. The three main functions of access control are: 218 Chapter Six Allowing access to those who are authorized. Denying access to those who are not authorized. Determining who has used access privileges and when. Consider how the most basic access control system, the locked door and key, han- dles these functions. Suppose you are the proprietor of a small business with three employees located in a one-room office that has only one door. You give each em- ployee a key to that door, thus authorizing their access to the office. Access to unau- thorized persons is denied because they don't have keys. You can determine when access privileges have been used by the fact that people are in the office. Clearly there are a lot of gaps in this site access control system, but it might well be entirely adequate for a small organization where there is a high level of trust. The most obvious gap is that you, as proprietor, will have only limited knowledge of who has used their access privileges during those times when you are not in the office. The most obvious way to make the system more restrictive is not to give everyone a key. Persons who are not issued a key then will have conditional access, meaning that they can get in only if someone with a key lets them in or lends them a key. The larger the organization and the more complex the space that it occupies, the less reliable the basic locked-door-and-key system becomes. There are more doors to be locked and additional levels of authorization beyond the simple has-key/doesnlt have-key option. Physical key management, which was discussed in chapter 4, be- comes a serious problem. It gets progressively harder to keep track of who has keys to whch locks. Keys can be borrowed, stolen, lost, and copied. The revoking of access privileges becomes a very serious problem. For these reasons, many organizations use more sophsticated systems, based on keys or other technology. More advanced systems Various technologies have been applied to address the problems cited earlier. These include electromagnetic locks, programmable locks, keypads, electronic tokens, and magnetic stripe cards (see Figure 6.2). Exploring all of these devices in detail is be- yond the scope of this text; however, a brief account of each will help you plan fur- ther investigations if your responsibilities encompass this field of security now or in the future (one of the best places to learn more about these systems and stay in touch with the latest developments is Security Magazine, a monthly publication de- voted to physical security). All of these technologies provide improved key management, and some allow more precise control of access privileges (for example, person X can enter room Y, but not after 6:00 P.M.). Some systems also can track the use of privileges (card nun- ber 21 was used to enter room A at 6:49 A.M.). Some even can report attempted abuse (card number 21 attempted to enter room B after 9 P.M. on three consecutive nights this week). However, it is important to bear in mind that few access control systems actually guarantee the identity of a person using an access privilege. Badges can be borrowed, and numbers can be shared (see the later section on biometrics for ways of solving ths problem). Secure Sites 219 Figure 6.2 A variety of modern keys and cards Electromagnetic locks. An electromagnetic lock, like the one shown in Figure 6.3. can be operated with a conventional key, but circuitg allows the security officer to override the lock to cope with various conditions, such as: No key required during normal business hours Key required to enter on evenings and weekends No access, even with key, on evenings and weekends Key required to enter during business hours Figure 6.3 An electromagnetic lock 220 Chapter Six Electromagnetic locks can be used to prevent exit from certain doors unless it is an emergency and to sound an alarm if the door is used for an exit. These locks can be built to withstand serious attacks. The example in Figure 6.3 has a "holding force" rating of 1650 pounds. Programmable locks and tokens. One of the most common examples of program- mable locks are the ones on hotel room doors that use keys with holes in. The key it- self contains no indication as to which door it operates. The lock on the door can be programmed to accept only those keys with a specific pattern of holes. This allows the management to cancel keys very easily. Several examples of different styles of programmable locks can be seen in Figure 6.4. These locks require a special key that contains a unique identity code stored in ROM. Locks can be programmed to accept and reject keys based on their codes, al- lowing the system manager to cancel specific keys. Note that this type of key does not physically open the lock but is briefly inserted so that it can be read. Ths type of key sometimes is referred to as a token, because it triggers, rather than performs, the opening of the lock. You can increase the security of the system by adding a key- pad. Ths limits entry to persons who have a valid keyltoken and who know the nu- meric pass code. Locks of ths kind can be fitted with memory chips that allow hand-held "interrogation" to download and report recent "transactions," such as which keys were used and when. Keypads. There are considerable advantages to using keyless locks, referred to as keypad systems, such as the one shown in Figure 6.5. These often are seen in retail establishments and high-traffic public access areas. They limit access to people who know the numeric pass code. This code can be changed at anytime, which has the ef- fect of terminating access to those persons who are not informed of the new code. Figure 6.4 Programmable lock Secure Sites 221 Figure 6.5 Keypad entry system. Cards. There are several different technologies that employ an encoded device of credit card proportions, such as the one in Figure 6.6 or those shown earlier in Fig- ure 6.2.
Recommended publications
  • Linux on the Road
    Linux on the Road Linux with Laptops, Notebooks, PDAs, Mobile Phones and Other Portable Devices Werner Heuser <wehe[AT]tuxmobil.org> Linux Mobile Edition Edition Version 3.22 TuxMobil Berlin Copyright © 2000-2011 Werner Heuser 2011-12-12 Revision History Revision 3.22 2011-12-12 Revised by: wh The address of the opensuse-mobile mailing list has been added, a section power management for graphics cards has been added, a short description of Intel's LinuxPowerTop project has been added, all references to Suspend2 have been changed to TuxOnIce, links to OpenSync and Funambol syncronization packages have been added, some notes about SSDs have been added, many URLs have been checked and some minor improvements have been made. Revision 3.21 2005-11-14 Revised by: wh Some more typos have been fixed. Revision 3.20 2005-11-14 Revised by: wh Some typos have been fixed. Revision 3.19 2005-11-14 Revised by: wh A link to keytouch has been added, minor changes have been made. Revision 3.18 2005-10-10 Revised by: wh Some URLs have been updated, spelling has been corrected, minor changes have been made. Revision 3.17.1 2005-09-28 Revised by: sh A technical and a language review have been performed by Sebastian Henschel. Numerous bugs have been fixed and many URLs have been updated. Revision 3.17 2005-08-28 Revised by: wh Some more tools added to external monitor/projector section, link to Zaurus Development with Damn Small Linux added to cross-compile section, some additions about acoustic management for hard disks added, references to X.org added to X11 sections, link to laptop-mode-tools added, some URLs updated, spelling cleaned, minor changes.
    [Show full text]
  • Linux Laptop-HOWTO
    Linux Laptop−HOWTO Linux Laptop−HOWTO Table of Contents Linux Laptop−HOWTO.....................................................................................................................................1 Werner Heuser <[email protected]>...................................................................................................1 1. Preface..................................................................................................................................................1 2. Copyright, Disclaimer and Trademarks...............................................................................................1 3. Which Laptop to Buy?.........................................................................................................................1 4. Laptop Distribution..............................................................................................................................1 5. Installation...........................................................................................................................................2 6. Hardware In Detail...............................................................................................................................2 7. Palmtops, Personal Digital Assistants − PDAs, Handheld PCs − HPCs.............................................2 8. Cellular Phones, Pagers, Calculators, Digital Cameras, Wearable Computing...................................2 9. Accessories..........................................................................................................................................3
    [Show full text]
  • Linux Hardware Compatibility HOWTO
    Linux Hardware Compatibility HOWTO Steven Pritchard Southern Illinois Linux Users Group [email protected] 3.1.5 Copyright © 2001−2002 by Steven Pritchard Copyright © 1997−1999 by Patrick Reijnen 2002−03−28 This document attempts to list most of the hardware known to be either supported or unsupported under Linux. Linux Hardware Compatibility HOWTO Table of Contents 1. Introduction.....................................................................................................................................................1 1.1. Notes on binary−only drivers...........................................................................................................1 1.2. Notes on commercial drivers............................................................................................................1 1.3. System architectures.........................................................................................................................1 1.4. Related sources of information.........................................................................................................2 1.5. Known problems with this document...............................................................................................2 1.6. New versions of this document.........................................................................................................2 1.7. Feedback and corrections..................................................................................................................3 1.8. Acknowledgments.............................................................................................................................3
    [Show full text]
  • Presentation (PDF)
    The Past and Future of Pen Computing Conrad H. Blickenstorfer, Editor-in-Chief Pen Computing Magazine [email protected] http://www.pencomputing.com Technology has become the international language of progress, of building things rather than destroying them PC Market: Cloudy Future After 20 years of growth, demand leveling off IDC and Dataquest say shipments down first time ever, predict 6% down from 2000 Still 30 million each in Q2 and Q3 2001, but…. – Commodity components make it difficult to make profit – PC prices have come down: – 1981: 4.77MHz PC costs US$4,000 ($7,767 in 2001 money) – 2001: 1.8GHz PC costs US$1,000 Notebook market a bit better Estimate: 26 million units for 2001, same as for 2000 It is clear that PCs and notebooks as we know them represent the past and the present of computing, but not necessarily the future of computing. Many people agree that PDAs and pen tablets or web tablets are a technology with a very promising future. PDA Projections (1) IDC said that Asia Pacific (without Japan) PDA sales were about two million in 2000. Dataquest said there were 2.1 million PDAs sold in Europe in 2000, with Palm and Pocket PC each having a market share of about 40% in Q2/2001. The US PDA market is 7-8 million units this year, and represents 60-70% of worldwide PDA sales right now. Microsoft said in May 2001 that 1.25 million Pocket PCs have sold since the April 2000 introduction. At a August Microsoft conference in Seattle, Washington, Microsoft said that two million Pocket PCs have been sold worldwide.
    [Show full text]
  • Linux Hardware Compatibility HOWTO Linux Hardware Compatibility HOWTO
    Linux Hardware Compatibility HOWTO Linux Hardware Compatibility HOWTO Table of Contents Linux Hardware Compatibility HOWTO........................................................................................................1 Patrick Reijnen, <[email protected] (remove both "antispam.")>..1 1.Introduction...........................................................................................................................................1 2.Computers/Motherboards/BIOS...........................................................................................................1 3.Laptops..................................................................................................................................................1 4.CPU/FPU..............................................................................................................................................1 5.Memory.................................................................................................................................................1 6.Video cards...........................................................................................................................................2 7.Controllers (hard drive).........................................................................................................................2 8.Controllers (hard drive RAID)..............................................................................................................2 9.Controllers (SCSI)................................................................................................................................2
    [Show full text]
  • Linux Laptop-HOWTO
    Linux Laptop−HOWTO Linux Laptop−HOWTO Table of Contents Linux Laptop−HOWTO.....................................................................................................................................1 Werner Heuser <[email protected]>....................................................................................................1 1. Preface..................................................................................................................................................1 2. Copyright, Disclaimer and Trademarks...............................................................................................1 3. Which Laptop to Buy?.........................................................................................................................1 4. Laptop Distribution..............................................................................................................................2 5. Installation...........................................................................................................................................2 6. Hardware In Detail...............................................................................................................................2 7. Palmtops, Personal Digital Assistants − PDAs, Handheld PCs − HPCs.............................................2 8. Cellular Phones, Pagers, Calculators, Digital Cameras, Wearable Computing...................................3 9. Accessories..........................................................................................................................................3
    [Show full text]
  • Laptops, Notebooks, PDA's, Cameras De 1965 À 2008 Laptops
    Laptops, Notebooks, PDA’s & more Laptops, Notebooks, PDA’s, Cameras de 1965 à 2008 dernière mise à jour 08 avril 2021, 103 objets Lien intéressant: The Glamourus History of Portable Computers 1 Sections ► laptops , notebooks et portables ► PDA’s ► caméras digitales ► players, divers 2 ► ► Laptop … ► laptops , notebooks et portables 3 Amstrad PPC512D Fabricant AMSTRAD UK Nom Modèle PPC512D Année 1987 Type laptop 8 bit µP NEC V30, 8 MHz Ram 640 kB Stockage floppy 2 x 720 kB Premier ordinateur portable compatible d’Amstrad. Ecran OS DOS 3.3 LCD N/B CGA, 640x200. Possibilité de fonctionner sur 10 batteries sèches type C. Database 152 Don THILMAN et Fils Fonctionne oui http://computermuseum.wordpress.com/ Utilisé LCD non http://www.computinghistory.org.uk/det/24547/Amstrad-PPC-512D/ 4 APPLE Powerbook 100 Fabricant APPLE US Nom Macintosh Modèle Powerbook 100 Année 1991 Type laptop 32 bit µP 68HC000, 16 Mhz Ram 2 MB Stockage floppy 3.5”, 1.44 MB Ecran LCD 9” N/B, 640 x 400 pixels. OS System 7 HD SCSI avec connecteur externe. Database 388, 396 Don Jean MOOTZ, Othon SCHOLER. Fonctionne non Utilisé LCD non http://en.wikipedia.org/wiki/PowerBook_100 5 APPLE Powerbook 140 Fabricant APPLE US Nom Macintosh Modèle Powerbook 140 Année 1991 Type laptop 32 bit µP 68030, 16 Mhz Ram 2 MB Stockage HD 40 MB, fl. 3.5” Ecran LCD 10” N/B, 640 x 400 pixels. OS System 7 HD SCSI avec connecteur externe. Database 143 Don Fernand STEFFEN. Fonctionne non Utilisé LCD non http://en.wikipedia.org/wiki/PowerBook_100 6 APPLE Powerbook 165c Fabricant APPLE US Nom Macintosh Modèle Powerbook 165c Année 1993 Type laptop 32 bit µP 68030, 33 Mhz Ram 4 MB Stockage HD 80 MB, fl.
    [Show full text]
  • (Cellular) Phones, Pagers, Calculators, Digital Cameras, Wearable Computing
    Linux on the Road Linux with Laptops, Notebooks, PDAs, Mobile Phones and Other Portable Devices Werner Heuser <wehe[AT]tuxmobil.org> Linux Mobile Edition Edition Version 3.21 TuxMobil Berlin Copyright © 2000−2005 Werner Heuser 2005−11−14 Revision History Revision 3.21 2005−11−14 Revised by: wh Some more typos have been fixed. Revision 3.20 2005−11−14 Revised by: wh Some typos have been fixed. Revision 3.19 2005−11−14 Revised by: wh A link to keytouch has been added, minor changes have been made. Revision 3.18 2005−10−10 Revised by: wh Some URLs have been updated, spelling has been corrected, minor changes have been made. Revision 3.17.1 2005−09−28 Revised by: sh A technical and a language review have been performed by Sebastian Henschel. Numerous bugs have been fixed and many URLs have been updated. Revision 3.17 2005−08−28 Revised by: wh Some more tools added to external monitor/projector section, link to Zaurus Development with Damn Small Linux added to cross−compile section, some additions about acoustic management for hard disks added, references to X.org added to X11 sections, link to laptop−mode−tools added, some URLs updated, spelling cleaned, minor changes. Revision 3.16 2005−07−15 Revised by: wh Added some information about pcmciautils, link to SoftwareSuspend2 added, localepurge for small HDDs, added chapter about FingerPrint Readers, added chapter about ExpressCards, link to Smart Battery System utils added to Batteries chapter, some additions to External Monitors chapter, links and descriptions added for: IBAM − the Intelligent Battery Monitor, lcdtest, DDCcontrol updated Credits section, minor changes.
    [Show full text]
  • Thank You for Purchasing This Factory Service Manual CD/DVD from Servicemanuals4u.Com
    Thank you for purchasing this Factory Service Manual CD/DVD from servicemanuals4u.com. Please check out our eBay auctions for more great deals on Factory Service Manuals: servicemanuals4u NOTICE The information in this guide is subject to change without notice. Compaq Computer Corporation shall not be liable for technical or editorial errors or omissions contained herein; nor for incidental or consequential damages resulting from the furnishing, performance, or use of this material. This guide contains information protected by copyright. No part of this guide may be photocopied or reproduced in any form without prior written consent from Compaq Computer Corporation. Copyright 1993 Compaq Computer Corporation. All rights reserved. Printed in the U.S.A. Compaq, Deskpro, LTE Registered U. S. Patent and Trademark Office. Concerto and ROMPaq are trademarks of Compaq Computer Corporation. Microsoft is a registered trademark of Microsoft Corporation. Windows is a trademark of Microsoft Corporation. Product names mentioned herein may be trademarks and/or registered trademarks of their respective companies. MAINTENANCE AND SERVICE GUIDE COMPAQ CONCERTO FAMILY OF PERSONAL COMPUTERS First Edition (September 1993) Part Number 144906-001 PREFACE This Maintenance and Service Guide is a troubleshooting guide that can be used for reference when servicing the Compaq Concerto Personal Computer. Additional information is available in the Technical Reference Guide. Compaq Computer Corporation reserves the right to make changes to the Compaq Concerto Personal Computer without notice. Symbols The following words and symbols mark special messages throughout this guide: >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> WARNING <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< Text set off in this manner indicates that failure to follow directions in the warning could result in bodily harm or loss of life.
    [Show full text]
  • £1500 to Spend? 22 Multimedia DX2 66S from £949 P454
    JUNE 1995 Personal Computer World June 1995 £2.50 Multimedia kits,mice, Overseas Price £2.95 France 58 FF Germany DM 17,00 Italy 13,400 Lire Spain 925 PTS keyboards and software Holland HFL 14,25 Belgium 272.00 BFr Finland FIM 39.50 to Win on page 619 VNU Business Publications ● 157,544 readers can't be wrong • Britain's top-selling personal computer magazine 22 Multimedia DX2 66MHz 486s Awards 1995 ● Best Hardware, Software, Peripherals 1995AwardsAwards ● £1500 to spend? Readers' MATHS SOFTWARE How to buy a complete Awards PC system p408 Best hardware 22 Multimedia Best software DX2 66s from Best peripherals ● £949 p454 Ami Pro 4.0 ● New Releases Quicken 4.0 Ami Pro 4.0 and Entry Level PowerMacs Quicken 4. 0 If your Disk or CD is missing, Volume 18 Number 6 please ask your June 1995 Newsagent June 1995 PCW June 1995 Contents Features First Impressions Regulars Hands On PC Awards 325 Newsprint The Infobahn is set to become a reality; the PC world prepares for the 21st century; 1995 Adobe and NetScape indulge in Acrobatics; Delrina homes in on memory lane; the French have their PCs, the Brits have more fun; The best PCs, Amstrad airs “Text Radio”; Gates on Win95. 627 Introduction 628 Windows 346 News Analysis PC software and DOS Tim Bajarin on the industry vs. Microsoft; 632 peripherals Jack Schofield on the future of Unix; 634 32-Bit 366 Compaq DeskPro 575 Barry Fox on video data storage. Word Processing voted for by you, Model 420 4/4 638 With outstanding network management 642 Spreadsheets the readers 351 Sounding Off by Michael Hewitt and top-of-the-range components, this 646 Databases looks set to make a real impact.
    [Show full text]
  • Tablet PC Magazine
    PCM 044, Tablet PC insert 3/12/02 10:11 AM Page 3 ▲ ▲ Tablet PC Update ▲ ▲ The TPC Team ▲ ▲ TPC Technologies ▲ ▲ Hardware OEMs ▲ ▲ What’s next? www.tabletpcmagazine.com spring 2002 volume 1 issue 1 IN THIS ISSUE: HOW WILL THE TABLET PC 2002 Technology update WORK Convertible vs “Pure” Tablet FOR Compaq Tablet PC YOU? Prototype Interviews with Tablet PC movers and shakers POWERED BY How is the Tablet PC PEN COMPUTING MAGAZINE different from the COMING SOON TO A NEWSSTAND NNootteebbooookk?? NEAR YOU PCM 044, Tablet PC insert 3/12/02 10:11 AM Page A2 U P D ATE By Geoff Walker Tablet PC Update Lots of CHANGES AT A GLANCE MANY CHANGES HAVE TAKEN PLACE IN THE TABLET PC publicity, PROJECT DURING THE EIGHT MONTHS SINCE THE FIRST yet Microsoft ARTICLE. The important changes can be summarized as follows: ● Microsoft has made minor changes in the Tablet PC positioning plays it close ● More OEMs and ODMs have joined the project and announced to the vest. their intentions ● A number of OEMs and ODMs showed hardware prototypes at Here is Comdex 2001 what has ● “Windows XP Tablet PC Edition” was announced at Comdex 2001 happened ● XP Tablet was promoted from an “add-on” to a full-fledged with the version of Windows ● The Beta-1 version of XP Tablet and the associated SDK were Tablet PC released in October since the ● Microsoft published the Tablet PC Hardware Require- ments document initial Tablet All of the changes can be grouped into four major categories: (1) marketing, PC feature (2) the Tablet PC OEMs & ODMs, (3) software, and in the (4) hardware.
    [Show full text]
  • Compaq Computer Corp
    SECURITIES AND EXCHANGE COMMISSION FORM 8-K Current report filing Filing Date: 1994-01-26 | Period of Report: 1994-01-26 SEC Accession No. 0000714154-94-000002 (HTML Version on secdatabase.com) FILER COMPAQ COMPUTER CORP Business Address 20555 SH 249 CIK:714154| IRS No.: 760011617 | State of Incorp.:DE | Fiscal Year End: 1231 HOUSTON TX 77070 Type: 8-K | Act: 34 | File No.: 001-09026 | Film No.: 94502822 7133700670 SIC: 3571 Electronic computers Copyright © 2012 www.secdatabase.com. All Rights Reserved. Please Consider the Environment Before Printing This Document ______________________________________________________ ______________________________________________________ SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 8-K CURRENT REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 Date of Report: January 26, 1994 COMPAQ COMPUTER CORPORATION (Exact name of Registrant as specified in its charter) Commission file number 1-9026 Delaware 76-0011617 (State or other jurisdiction of (I.R.S. Employer incorporation or organization) Identification No.) 20555 SH 249, Houston, Texas 77070 (Address, including zip code, of Registrant's principal executive offices) Registrant's telephone number, including area code: (713) 370-0670 Copyright © 2012 www.secdatabase.com. All Rights Reserved. Please Consider the Environment Before Printing This Document ______________________________________________________ ______________________________________________________ Item 5. Other Events. The Registrant's earnings press release for the year and quarter ended December 31, 1993 dated January 26, 1994 is attached. SIGNATURES Pursuant to the requirements of the Securities Exchange Act of 1934, the Registrant has duly caused this report to be signed on its behalf by the undersigned hereunto duly authorized. Compaq Computer Corporation January 26, 1994 /s/ DARYL J.
    [Show full text]