Why don't you just restrict booting by using LILO's "password=" and "restricted" in /etc/lilo.conf? Here is what the man page for "lilo.conf" says:
password=password Protect the image by a password. restricted A password is only required to boot the image if parameters are specified on the command line (e.g. single). To prevent modification via a rescue boot floppy you can probably disable booting via floppy in the BIOS and then password protect the BIOS using the BIOS's own security features. -Ossama On Wed, 5 Aug 1998, Liran Zvibel wrote: > Hi. > > We consider putting Linuxes (or should it be Linuces? )in the classes, but > don't want the students to be able to boot single user and then rm -r *, > or open accounts and try to get into the network. > > Is there an easy was to put a password on single user boot? > > If not, I have and idea how to prevent it: > 1. Repartition that way that there is another primary partition of about 1 > MB in size. > 2. dd the kernel to that partition (after it was 'rdev'ed to the real root > partition. > 3. Make this partition the only one bootable. > 4. Disable the possibility to boot from the floppy drive in the (password > protected) bios. (And the computers are locked so they (the students) > can't clear the bios settings with the jumpers) > > I think that in this was the students won't be able to boot single user. > > What do you say? > Is there an easier way to do it? > > > TIA, > Liran. > --- > http://www.math.tau.ac.il/~liranz/ > > > -- > Unsubscribe? mail -s unsubscribe [EMAIL PROTECTED] < /dev/null > > -- Unsubscribe? mail -s unsubscribe [EMAIL PROTECTED] < /dev/null