John Summerfield wrote:

> > hello,
> > the way out of this is to have even the single user mode of linux password
> > protected
> > to do this
> > login as root and then type liloconf . when you go to liloconf set the
> > password for single user mode . hope this help
> > :-)
>
> Bet it does not stop
>         linux init=/bin/bash
> If linux single user mode is given at lilo boot prompt this doesnt work (not
> for me atleast  Rh6.2 & 6.1) .

It keeps saying Sorry  and then prompts for password to enter  in to the system
once you get into the system you can change the lilo conf .

>
> Better use lilo password (and hide lilo.conf). Even this fails with a boot
> floppy or if someone pinches the HDD.
>

This could happen but if doesn't have a boot disk then it might not be possible
to get into the system but again physical security is most important

>
> You can secure the BIOS too, but that does not help if someone can take
> the box or HDD, or if they can reset the BIOS.
>
> Physical security is far more useful. Put your sensitives on a box in a
> securely-locked room.
> this is what necessary cause if someone has physical access to your machine
> its not  hard to break in(I guess).
> --
> Cheers
> John Summerfield
> http://os2.ami.com.au/os2/ for OS/2 support.
> Configuration, networking, combined IBM ftpsites index.
>
> --
> To unsubscribe:
> mail -s unsubscribe [EMAIL PROTECTED] < /dev/null


-- 
To unsubscribe:
mail -s unsubscribe [EMAIL PROTECTED] < /dev/null

Reply via email to