John Summerfield wrote:
> > hello,
> > the way out of this is to have even the single user mode of linux password
> > protected
> > to do this
> > login as root and then type liloconf . when you go to liloconf set the
> > password for single user mode . hope this help
> > :-)
>
> Bet it does not stop
> linux init=/bin/bash
> If linux single user mode is given at lilo boot prompt this doesnt work (not
> for me atleast Rh6.2 & 6.1) .
It keeps saying Sorry and then prompts for password to enter in to the system
once you get into the system you can change the lilo conf .
>
> Better use lilo password (and hide lilo.conf). Even this fails with a boot
> floppy or if someone pinches the HDD.
>
This could happen but if doesn't have a boot disk then it might not be possible
to get into the system but again physical security is most important
>
> You can secure the BIOS too, but that does not help if someone can take
> the box or HDD, or if they can reset the BIOS.
>
> Physical security is far more useful. Put your sensitives on a box in a
> securely-locked room.
> this is what necessary cause if someone has physical access to your machine
> its not hard to break in(I guess).
> --
> Cheers
> John Summerfield
> http://os2.ami.com.au/os2/ for OS/2 support.
> Configuration, networking, combined IBM ftpsites index.
>
> --
> To unsubscribe:
> mail -s unsubscribe [EMAIL PROTECTED] < /dev/null
--
To unsubscribe:
mail -s unsubscribe [EMAIL PROTECTED] < /dev/null