On Sat, 21 Mar 1998, Tom Diehl wrote:
> On Sun, 22 Mar 1998, Stelios Bounanos wrote:
>
> > The `restricted' option causes LILO to boot Linux without a password,
> > but if someone tries to pass any options to the kernel (including
> > single), they'll be asked for one.
>
> And a boot disk will bypass this and any other options you put in lilo.
> The only way to secure a machine it NOT to allow physical access.
> If they know about linux single they know how to use a boot disk.
> You are just kidding yourself if you think your machine is secure.
You could of course remove the ability to boot from floppy in your BIOS,
then password protect the BIOS. However, then you must also superglue your
chassi so that the "bad guy" can't open it and reset the BIOS according to
the instructions in that manual you left on that shelf.
Then of course he could also scan for waves from your monitor and see some
secret stuff, maybe your password, and then login from remote or even
local anyway. One can always be paranoid, there is one secure way to
protect your data: never create it.
--
Henrik Edlund <[EMAIL PROTECTED]>
PGP Public Key available at http://www.piett.com/about/pgp.txt
"They were in the wrong place at the wrong time.
Naturally they became heroes."
Leia Organa of Alderaan, Senator
--
PLEASE read the Red Hat FAQ, Tips, Errata and the MAILING LIST ARCHIVES!
http://www.redhat.com/RedHat-FAQ /RedHat-Errata /RedHat-Tips /mailing-lists
To unsubscribe: mail [EMAIL PROTECTED] with
"unsubscribe" as the Subject.