Rick Moen wrote:
> (Ever drained a motherboard's CMOS to reset it? Guess what happens to
> your so-called "BIOS security"?)
>
> It's kinda cute when a five-year-old thinks a 6" x 6" x 6" toy cube is
> "secure" in any meaningful sense. The analogy to, say, Kurt Seifried of
> linuxsecurity.com is left as an exercise for the reader.
Of course, you can't rely on BIOS and GRUB security alone. Those two are
meant to stop average-skilled users. :) There's no one stoping the user to
open the case and drain the betery or short the jumpers to reset the BIOS.
Then after that install a CDROM drive to boot from there.
If you really need some security for that room, you might as well put it in
a room located in a facility similar to a missile silo, then have thousands
of guards patrolling the place. The wa;lls of the room must be 2m thick
steel. ;) Just outside the room, install an access control system that would
require you a token, biometrics, and a password/pin to enter the place.
____INSERT YOUR SECURITY MEASURE HERE________
Anyway, I just mentioned GRUB to prevent someone using single user mode or
using other programs other than init at the bootprompt.
--
=======================================================================
Gideon N. Guillen
E-mail: [EMAIL PROTECTED]
PGP Public Keys:
DSS/Diffie-Hellman
mailto:[EMAIL PROTECTED]?subject=get%200xC0976975
RSA Key:
mailto:[EMAIL PROTECTED]?subject=get%200x76C298B1
=======================================================================
_
Philippine Linux Users Group. Web site and archives at http://plug.linux.org.ph
To leave: send "unsubscribe" in the body to [EMAIL PROTECTED]
To subscribe to the Linux Newbies' List: send "subscribe" in the body to
[EMAIL PROTECTED]