Udo Rader said onto me: ------------------------------------------------------------------ |thats why we have our servers under 3meters of concrete and behind |multiple access-control systems ... unless mcguyver comes along and uses |his swiss pocketknife to disengage all entrance barriers ;-)) and duck tape......can't forget the duck tape | |even on enterprise they still have those bad aliens compromizing their |systems sometimes ... | |my point: there is no such thing as computer security that is really |secure. only chance: don't use a computer ... | |udo | |Am Mon, 2002-06-03 um 23.58 schrieb M@rtin Ign@cio L@nge: |> Restoring Bios to defaults its only a matter of opening the Case and in |> the mother change a jumper from 1-2 to 2-3... give power to the computer |> for 5 seconds and then restoring again to 1-2 the jumper. That's it, in |> the mos complicated scenario the thing you have to do is get together |> pole + with pole - with a wire. And that's it too. |> |> |> |> Martin Ignacio Lange |> "Justifica tus limitaciones y ciertamente las tendras" |> "Knowledge is Power" |> |> Mails: |> |> 1) [EMAIL PROTECTED] |> 2) [EMAIL PROTECTED] |> 3) [EMAIL PROTECTED] |> 4) [EMAIL PROTECTED] |> |> Icq #: 17492486 |> Tel: 4746-3426 |> Cel: 154-994-5526 |> |> |> -----Original Message----- |> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Ken Hawkins |> Sent: Lunes, 03 de Junio de 2002 06:08 p.m. |> To: [EMAIL PROTECTED] |> Subject: Re: [expert] A Linux Virus on the loose. |> |> darklord wrote: |> > |> > On Monday 03 June 2002 11:39 am, you wrote: |> > > And this leads to the simple conclusion that if one has physical |> access to |> > > a computer, then security is largely out the window. Any clown |> could come |> > > in and bootup with a rescue disk (addressing the linux aspect) and |> do |> > > whatever to your drives. If they had the time, they could also |> bring in a |> > > set of linux distro disks and reinstall linux their way. |> > > |> > > The only way to prevent this is to turn off the booting from CD in |> bios and |> > > password protecting bios, but then, with physical access it is |> trivial to |> > > kill the bios password (just crack the case and remove the mobo |> battery for |> > > a minute - bios settings are back to default and accessible without |> a |> > > password). |> |> Unless your mobo flashroms the password; came across this and had to get |> tech support to explain that first you must remove the battery, THEN you |> must pull a jumper, then you must short out some pins on the BIOS chip |> where it is soldered to the board....little paranoid maybe? |> |> |> |> > > |> > > Thus, I see no harm at all in hearing the means one would use to |> create a |> > > UID 0 person, append them to passwd and create an appropriately |> > > formatted/encrypted shadow password for them in /etc/shadow. |> > > |> > > praedor |> > |> > Hehehehe, I've got mine disabled in BIOS, and my case is hardware |> locked. Of |> > course, if someone has access to my system, then they've already |> gotten into |> |> |> |> |> ---- |> | |> Want to buy your Pack or Services from MandrakeSoft? |> Go to http://www.mandrakestore.com | | | | | | ------------------------------------------------------------------ -- ����������������������������������������������������������������������� David L. Steiner Registered Linux User #262493 Mandrake 8.2 Enlightenment 0.16.5 Sylpheed 0.7.5claws Email: [EMAIL PROTECTED] Homepage: www.davidlsteiner.com �����������������������������������������������������������������������
Want to buy your Pack or Services from MandrakeSoft? Go to http://www.mandrakestore.com
