Why don't you just restrict booting by using LILO's "password=" and
"restricted" in /etc/lilo.conf? Here is what the man page for "lilo.conf"
says:

       password=password
              Protect the image by a password.

       restricted
              A password is only required to boot  the  image  if
              parameters  are specified on the command line (e.g.
              single).

To prevent modification via a rescue boot floppy you can probably disable
booting via floppy in the BIOS and then password protect the BIOS using
the BIOS's own security features.

-Ossama

On Wed, 5 Aug 1998, Liran Zvibel wrote:

> Hi.
> 
> We consider putting Linuxes (or should it be Linuces? )in the classes, but
> don't want the students to be able to boot single user and then rm -r *,
> or open accounts and try to get into the network.
> 
> Is there an easy was to put a password on single user boot?
> 
> If not, I have and idea how to prevent it:
> 1. Repartition that way that there is another primary partition of about 1
> MB in size. 
> 2. dd the kernel to that partition (after it was 'rdev'ed to the real root
> partition.
> 3. Make this partition the only one bootable.
> 4. Disable the possibility to boot from the floppy drive in the  (password
> protected) bios. (And the computers are locked so they (the students) 
> can't clear the bios settings with the jumpers)
> 
> I think that in this was the students won't be able to boot single user.
> 
> What do you say?
> Is there an easier way to do it?
> 
> 
> TIA,
> Liran.
> ---
> http://www.math.tau.ac.il/~liranz/
> 
> 
> --  
> Unsubscribe?  mail -s unsubscribe [EMAIL PROTECTED] < /dev/null
> 
> 


--  
Unsubscribe?  mail -s unsubscribe [EMAIL PROTECTED] < /dev/null

Reply via email to