On Fri Mar 14 11:52 -0500, Jason Straight wrote:or, even more simply, resetting the bios, either by removing the cmos battery, or in some computers there is a cmos clear pin header. short the pins and it clears cmos, including passwords....
On Friday 14 March 2003 11:11 am, Levi Ramsey wrote:
If someone has physical access to the computer they can pass their ownman lilo - you can restrict it from allowing cmdline, or even booting altogether wihout a pw.
parameters to the kernel, including init=/bin/bash, whcih, bada bing
bada boom, gives them instant root.
Still, if someone has physical access to the computer, there's no stopping them from opening it, removing the drive, mounting it themselves, and editing the boot-sector to disable the password ;o)
Levi Ramsey wrote:
- Re: [Cooker] security audit Adam Williamson
- Re: [Cooker] security audit Jason Straight
- Re: [Cooker] security audit Guillaume Cottenceau
- Re: [Cooker] security audit Vincent Danen
- Re: [Cooker] security audit Adam Williamson
- Re: [Cooker] security audit scott chevalley
- Re: [Cooker] security audit Jason Straight
- Re: [Cooker] security audit Levi Ramsey
- Re: [Cooker] security audit Jason Straight
- Re: [Cooker] security audit Levi Ramsey
- Re: [Cooker] security audit scott chevalley
- Re: [Cooker] security audit Levi Ramsey
- Re: [Cooker] security audit scott chevalley
- Re: [Cooker] security audit Per �yvind Karlsen
- Re: [Cooker] security audit Buchan Milne
- Re: [Cooker] security audit Guillaume Cottenceau
- Re: [Cooker] security audit Brook Humphrey
