On Fri, 11 May 2001, Daniel Manrique wrote:
> > I've been informed this is a 'feature' not a 'flaw'. sound like MS?
>
> No, it doesn't.
>
> The "linux single" or "linux 1" "security flaw" gets "spotted"
> continuously, by people who don't realize that, given physical access to
> the computer
Linda MacPhee-Cobb wrote:
> Hi,
>
> I've been informed this is a 'feature' not a 'flaw'. sound like MS?
> Well its a PC. So lets firstly look at this objectively
> Got a screwdriver. Then you have root access.
> Floppy driver and the machine boots floppy first. Then you have root access
Be
They are correct. This is a feature. Booting into single user mode is
there to fix problems and restore lost passwords. Physical security is
important! There is a reason that important computers are in a locked data
center.
If I have physical access to your workstation I can boot from a Linu
Also, if you want to disable this just edit your /etc/inittab and remove the
single user runlevel. Or, put a password on the LILO prompt. But remember,
I can get around that with a boot disk. Like Red Hat said, use an
encryptable file system. Just be careful and don't forget your root
password
>
> I've been informed this is a 'feature' not a 'flaw'. sound like MS?
>
No, it doesn't.
The "linux single" or "linux 1" "security flaw" gets "spotted"
continuously, by people who don't realize that, given physical access to
the computer system, there's virtually *NO* way to protect from