On Fri, Dec 22, 2000 at 11:05:32PM -0900, Ethan Benson wrote:
> On Fri, Dec 22, 2000 at 05:54:55PM -0400, Peter Cordes wrote:
> >
> > That's why you run the checker from a known-good floppy or CD. The bogus
> > kernel can't protect itself if it isn't running :)
>
> don't be so sure, is the BIOS or firmware on your computer flashable?
> if so an attacker could replace the firmware/BIOS itself to ensure
> later trojans are installed.
Oh crap, I didn't think of that! It would be a really hard attack if you
didn't know what kernel was going to get loaded, but in theory there's no
way around it, short of burning non-flashable ROMs! (Well, you could take
the drive out of the computer and test it in another computer.)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]