SCIENTIFIC-LINUX-USERS Archives

February 2012

SCIENTIFIC-LINUX-USERS@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Yasha Karant <[log in to unmask]>
Reply To:
Yasha Karant <[log in to unmask]>
Date:
Wed, 1 Feb 2012 09:28:58 -0800
Content-Type:
text/plain
Parts/Attachments:
text/plain (21 lines)
On 02/01/2012 09:03 AM, Konstantin Olchanski wrote:
> On Wed, Feb 01, 2012 at 08:47:28AM -0800, Yasha Karant wrote:
>> https://bugzilla.redhat.com/show_bug.cgi?id=636628
[snip]
> Anyone with physical access to the machine can walk away with your disks,
> or boot their own OS from a USB disk or from the network, and have root access
> to all files without having to get root access. So you can safely assume
> that for unfriendly purposes, having physical access is the same as knowing
> the root password.
>

It is my understanding that if the BIOS on a standard IA-32 or X86-64 
machine is protected by a boot password, then there is no access to the 
boot procedure of the BIOS and thus the media you suggest cannot be 
booted unless these are in BIOS boot order preceding the physical 
internal hard drive.

Am I an in error?

Yasha Karant

ATOM RSS1 RSS2