Read through what the Masters of Paranoia have to say, in the NSA guide to securing OS X: <http://www.nsa.gov/snac/os/applemac/osx_client_final_v.1.pdf>



Bruce,

That's awesome!  Good find!

From the same document:
Open Firmware protection can be violated if the user has physical access to the
machine. Open Firmware password protection can be bypassed if the user changes
the physical memory configuration of the machine and then resets the PRAM 3 times
(holding down command-option-P-R during boot).
An Open Firmware password will provide
some protection, however, it can be
reset if a user has physical access to the
machine and can change the physical
memory configuration of the machine.

The author suggested setting a "command mode" password (which appears to be slightly different than what Apple's OF Password utility does). But it's interesting that the password can be bypassed if the user pulls a stick of RAM and resets PRAM 3 times thereafter... Do you think that's an Apple-designed back door?


Peace,
Drew

--


Author of ClassicStumbler email: <[EMAIL PROTECTED]> web: <http://www.alksoft.com/>

Visit the PowerBook 5300 FAQ!
<http://www.alksoft.com/5300_FAQ/>

--
G-Books is sponsored by <http://lowendmac.com/> and...

Small Dog Electronics    http://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |  & CDRWs on Sale!  |

     Support Low End Mac <http://lowendmac.com/lists/support.html>

G-Books list info:      <http://lowendmac.com/lists/g-books.html>
 --> AOL users, remove "mailto:";
Send list messages to:  <mailto:[EMAIL PROTECTED]>
To unsubscribe, email:  <mailto:[EMAIL PROTECTED]>
For digest mode, email: <mailto:[EMAIL PROTECTED]>
Subscription questions: <mailto:[EMAIL PROTECTED]>
Archive: <http://www.mail-archive.com/g-books%40mail.maclaunch.com/>



---------------------------------------------------------------
The Think Different Store
http://www.ThinkDifferentStore.com
---------------------------------------------------------------




Reply via email to