thats why we have our servers under 3meters of concrete and behind multiple access-control systems ... unless mcguyver comes along and uses his swiss pocketknife to disengage all entrance barriers ;-))
even on enterprise they still have those bad aliens compromizing their systems sometimes ... my point: there is no such thing as computer security that is really secure. only chance: don't use a computer ... udo Am Mon, 2002-06-03 um 23.58 schrieb M@rtin Ign@cio L@nge: > Restoring Bios to defaults its only a matter of opening the Case and in > the mother change a jumper from 1-2 to 2-3... give power to the computer > for 5 seconds and then restoring again to 1-2 the jumper. That's it, in > the mos complicated scenario the thing you have to do is get together > pole + with pole - with a wire. And that's it too. > > > > Martin Ignacio Lange > "Justifica tus limitaciones y ciertamente las tendras" > "Knowledge is Power" > > Mails: > > 1) [EMAIL PROTECTED] > 2) [EMAIL PROTECTED] > 3) [EMAIL PROTECTED] > 4) [EMAIL PROTECTED] > > Icq #: 17492486 > Tel: 4746-3426 > Cel: 154-994-5526 > > > -----Original Message----- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Ken Hawkins > Sent: Lunes, 03 de Junio de 2002 06:08 p.m. > To: [EMAIL PROTECTED] > Subject: Re: [expert] A Linux Virus on the loose. > > darklord wrote: > > > > On Monday 03 June 2002 11:39 am, you wrote: > > > And this leads to the simple conclusion that if one has physical > access to > > > a computer, then security is largely out the window. Any clown > could come > > > in and bootup with a rescue disk (addressing the linux aspect) and > do > > > whatever to your drives. If they had the time, they could also > bring in a > > > set of linux distro disks and reinstall linux their way. > > > > > > The only way to prevent this is to turn off the booting from CD in > bios and > > > password protecting bios, but then, with physical access it is > trivial to > > > kill the bios password (just crack the case and remove the mobo > battery for > > > a minute - bios settings are back to default and accessible without > a > > > password). > > Unless your mobo flashroms the password; came across this and had to get > tech support to explain that first you must remove the battery, THEN you > must pull a jumper, then you must short out some pins on the BIOS chip > where it is soldered to the board....little paranoid maybe? > > > > > > > > > Thus, I see no harm at all in hearing the means one would use to > create a > > > UID 0 person, append them to passwd and create an appropriately > > > formatted/encrypted shadow password for them in /etc/shadow. > > > > > > praedor > > > > Hehehehe, I've got mine disabled in BIOS, and my case is hardware > locked. Of > > course, if someone has access to my system, then they've already > gotten into > > > > > ---- > > Want to buy your Pack or Services from MandrakeSoft? > Go to http://www.mandrakestore.com
Want to buy your Pack or Services from MandrakeSoft? Go to http://www.mandrakestore.com
