1 |
On Sun, Apr 16, 2006 at 09:54:33PM +1000, Penguin Lover Alan E. Davis squawked: |
2 |
> He felt betrayed. I understand why, I think: what's secure about |
3 |
> GNU/Linux if anyone can boot the system and reset his passwords? |
4 |
|
5 |
That is the same regardless of operating system. |
6 |
Physical access == no security. |
7 |
|
8 |
> How can anyone easily avoid the problem of anyone being able to access |
9 |
> the guts of his machine using a live CD? I already thought of one: |
10 |
> use the BIOS to disallow booting from a CD or Floppy, and set a |
11 |
> password on the BIOS. Don't know whether all BIOSes will allow this, |
12 |
> and anyway, isn't it possible on a lot of motherboards to short out |
13 |
> the EPROM and thus reset the password of the BIOS? |
14 |
|
15 |
You can also encrypt the contents of your hard drive. |
16 |
http://tldp.org/HOWTO/Disk-Encryption-HOWTO/ |
17 |
|
18 |
W |
19 |
|
20 |
-- |
21 |
Q: What's an anagram of "Banach-Tarski" ? |
22 |
|
23 |
A: "Banach-Tarski Banach-Tarski" |
24 |
Sortir en Pantoufles: up 155 days, 4:42 |
25 |
-- |
26 |
gentoo-user@g.o mailing list |