Rick Moen wrote:
> (Ever drained a motherboard's CMOS to reset it?  Guess what happens to
> your so-called "BIOS security"?)
> 
> It's kinda cute when a five-year-old thinks a 6" x 6" x 6" toy cube is
> "secure" in any meaningful sense.  The analogy to, say, Kurt Seifried of
> linuxsecurity.com is left as an exercise for the reader.

Of course, you can't rely on BIOS and GRUB security alone. Those two are
meant to stop average-skilled users. :) There's no one stoping the user to
open the case and drain the betery or short the jumpers to reset the BIOS.
Then after that install a CDROM drive to boot from there.

If you really need some security for that room, you might as well put it in
a room located in a facility similar to a missile silo, then have thousands
of guards patrolling the place. The wa;lls of the room must be 2m thick
steel. ;) Just outside the room, install an access control system that would
require you a token, biometrics, and a password/pin to enter the place.
____INSERT YOUR SECURITY MEASURE HERE________

Anyway, I just mentioned GRUB to prevent someone using single user mode or
using other programs other than init at the bootprompt.

-- 
=======================================================================

      Gideon N. Guillen
      E-mail: [EMAIL PROTECTED]


      PGP Public Keys:

      DSS/Diffie-Hellman
      mailto:[EMAIL PROTECTED]?subject=get%200xC0976975

      RSA Key:
      mailto:[EMAIL PROTECTED]?subject=get%200x76C298B1

=======================================================================


_
Philippine Linux Users Group. Web site and archives at http://plug.linux.org.ph
To leave: send "unsubscribe" in the body to [EMAIL PROTECTED]

To subscribe to the Linux Newbies' List: send "subscribe" in the body to 
[EMAIL PROTECTED]

Reply via email to