thats why we have our servers under 3meters of concrete and behind
multiple access-control systems ... unless mcguyver comes along and uses
his swiss pocketknife to disengage all entrance barriers ;-))

even on enterprise they still have those bad aliens compromizing their
systems sometimes ...

my point: there is no such thing as computer security that is really
secure. only chance: don't use a computer ...

udo

Am Mon, 2002-06-03 um 23.58 schrieb M@rtin Ign@cio L@nge:
> Restoring Bios to defaults its only a matter of opening the Case and in
> the mother change a jumper from 1-2 to 2-3... give power to the computer
> for 5 seconds and then restoring again to 1-2 the jumper. That's it, in
> the mos complicated scenario the thing you have to do is get together
> pole + with pole - with a wire. And that's it too.
> 
> 
> 
> Martin Ignacio Lange
> "Justifica tus limitaciones y ciertamente las tendras"
> "Knowledge is Power"
> 
> Mails:
> 
> 1) [EMAIL PROTECTED]
> 2) [EMAIL PROTECTED]
> 3) [EMAIL PROTECTED]
> 4) [EMAIL PROTECTED]
> 
> Icq #: 17492486
> Tel: 4746-3426
> Cel: 154-994-5526
> 
> 
> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Ken Hawkins
> Sent: Lunes, 03 de Junio de 2002 06:08 p.m.
> To: [EMAIL PROTECTED]
> Subject: Re: [expert] A Linux Virus on the loose.
> 
> darklord wrote:
> > 
> > On Monday 03 June 2002 11:39 am, you wrote:
> > > And this leads to the simple conclusion that if one has physical
> access to
> > > a computer, then security is largely out the window.  Any clown
> could come
> > > in and bootup with a rescue disk (addressing the linux aspect) and
> do
> > > whatever to your drives.  If they had the time, they could also
> bring in a
> > > set of linux distro disks and reinstall linux their way.
> > >
> > > The only way to prevent this is to turn off the booting from CD in
> bios and
> > > password protecting bios, but then, with physical access it is
> trivial to
> > > kill the bios password (just crack the case and remove the mobo
> battery for
> > > a minute - bios settings are back to default and accessible without
> a
> > > password).
> 
> Unless your mobo flashroms the password; came across this and had to get
> tech support to explain that first you must remove the battery, THEN you
> must pull a jumper, then you must short out some pins on the BIOS chip
> where it is soldered to the board....little paranoid maybe?
> 
> 
> 
> > >
> > > Thus, I see no harm at all in hearing the means one would use to
> create a
> > > UID 0 person, append them to passwd and create an appropriately
> > > formatted/encrypted shadow password for them in /etc/shadow.
> > >
> > > praedor
> > 
> > Hehehehe, I've got mine disabled in BIOS, and my case is hardware
> locked. Of
> > course, if someone has access to my system, then they've already
> gotten into
> 
> 
> 
> 
> ----
> 

> Want to buy your Pack or Services from MandrakeSoft? 
> Go to http://www.mandrakestore.com





Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com

Reply via email to