I did hear a rumour that RAM theft is a problem in corporate
environments.  Does anyone have any first hand experience of just how
prevelent it might be.

-- 
Howard.
______________________________________________________
LANNet Computing Associates <http://www.lannet.com.au>

On Fri, 15 Sep 2000, Angus Lees wrote:

> On Fri, Sep 15, 2000 at 01:21:59PM +1000, Stephen Mills wrote:
> > 1) be reminded that if a person has physical access to your linux machine,
> > they can usually have full access to all information within a few mins with
> > a boot floppy
> > 
> > 2) you can set a password on the lilo prompt to prevent them from booting an
> > image without the proper password, but rule 1 still applies, check out
> > /usr/doc/lilo-* for more info
> > 
> > 3) put your server under lock and key if its a problem
> 
> or in a lab-like environment:
> 
>  set to only boot from harddrive
> 
>  password protect the bios
> 
>  password protect lilo
> 
>  padlock the case closed (or put the case in a lockable steel cage)
>  (*make sure people can't just poke the 5.25 cover off, and reach in
>  anyway*)
> 
>  make sure that the machine boots to sulogin on single user
>  (ie: failed fsck)
> 
> and then you should be reasonably safe. floppy / cdrom can be accessed
> using the normal permissions (don't allow suid or devices on those
> media tho..)
> 
> 



--
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://slug.org.au/lists/listinfo/slug

Reply via email to