Bring your own (USB or 20pin w/ cable).

Remove the drive and plop it into your own case.

Hook the drive to your laptop (I saw a USB -> IDE dongle the other day, just
need an external power supply for the drive).

Unless you seal the computer in a box, pot it in epoxy or the like - if you
give PHYSICAL access to the hardware, all bets are off.

(I've got one of those USB drives with the BSOD screen saver on it for those
computer stores that think they're so clever at locking down the machine so
the only thing that runs is their little advert...)

-----Burton

-----Original Message-----
From: Gene Cronk [mailto:[EMAIL PROTECTED]]
Sent: Monday, January 27, 2003 6:57 PM
Cc: [EMAIL PROTECTED]
Subject: Re: security scenario


No CD Rom/Floppy in the server?  :-D

Burton M. Strauss III wrote:
> You can't ... well, the grub password may prevent the trivial case, but if
> you have physical access to the hardware, you have the keys to the
universe.
> (What would stop Mr/Ms Cracker from bring his/her OWN grub floppy?)
>
> -----Burton
>
> -----Original Message-----
> From: camthompson [mailto:[EMAIL PROTECTED]]
> Sent: Saturday, January 25, 2003 12:45 AM
> To: [EMAIL PROTECTED]
> Subject: security scenario
>
>
> consider this (I'm trying to make a network more secure) :
> A user enters grub upon bootup and hits "e" to edit the Linux boot
> procedure and then continues to boot into single user mode, and he then
> chagnes the root password to whatever he suits.... the user who did this
> is eventually tracked down and taken care of.
>
> Now, how would I prevent this from happening in future instances?

Reply via email to