SCIENTIFIC-LINUX-USERS Archives

February 2012

SCIENTIFIC-LINUX-USERS@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Konstantin Olchanski <[log in to unmask]>
Reply To:
Konstantin Olchanski <[log in to unmask]>
Date:
Wed, 1 Feb 2012 10:24:10 -0800
Content-Type:
text/plain
Parts/Attachments:
text/plain (20 lines)
On Wed, Feb 01, 2012 at 09:28:58AM -0800, Yasha Karant wrote:
> 
> It is my understanding that if the BIOS on a standard IA-32 or
> X86-64 machine is protected by a boot password, then there is no
> access to the boot procedure of the BIOS and thus the media you
> suggest cannot be booted unless these are in BIOS boot order
> preceding the physical internal hard drive.
>

All I know about BIOS passwords is that the procedure for
resetting them passwords is well documented in the mobo manual
and is easy to follow. (physical access inside the machine is required).
That greatly reduces their usefulness as a security tool.

-- 
Konstantin Olchanski
Data Acquisition Systems: The Bytes Must Flow!
Email: olchansk-at-triumf-dot-ca
Snail mail: 4004 Wesbrook Mall, TRIUMF, Vancouver, B.C., V6T 2A3, Canada

ATOM RSS1 RSS2