From: "Stephen Bird"
(clipped) (Nice summary BTW...)

>A reboot approach might be limited by an encrypted MBR
> and/or encrypted partitions.

Now you are getting into the "meat" of XP...
Use XP (NTFS only)  (May not be in "Home"??) to encrypt your files
(or folder/partitions??) for certain users.
Then, other users (meaning the office peeps too) will be read-locked out unless
they are really good... -- even if they re-boot and "get in" to the OS as a 
different
user, or with BartPE or XPPE...
Note when I say read-locked out, they "might(?)" be able to delete... (Not 
good.)
(I have seen dumber stuff other places...)

Side note:
I had something that had a software password boot screen that came with an MB...
I was using it, but I either set something wrong eventually, or it failed.
All the hackers were locked out all the time, but I eventually got locked out!!!
(This is why things like this are very scary to me!!!)
This was on a "clone" HD that I was "just fooling around on", so no harm done...

If there is an office door, lock it, forget it, and be MUCH safer...

PS: A quick Google search found the following: (Not tested, but seems good to 
me.)
While re-booting, the REAL "original install system admin" can log in and change
ANY/all "local admin" and "local user" passwords... So really, it all depends on
what "credentials" (if any) they can supply...  This also means if they are a 
"local"
admin of your computer, they can change your password and then get in "most" of
your stuff... This gets us back to NTFS encryption...  (I don't use it so I 
have to stop
now...)

Try the MBR encryption stuff and let us know how it works, --- (if you can 
<grin>)...

                                                      Rick Glazier

--
                ----------------------------------------
WIN-HOME Archives:  http://PEACH.EASE.LSOFT.COM/archives/WIN-HOME.html
Contact the List Owner about problems:  [EMAIL PROTECTED]
Unofficial Win-Home List Members Profiles Page
 http://winhome.wavijo.com/

Reply via email to