from debian wiki : edit /boot/grub/menu.lst and add the following two lines at the top. This prevents users from editing the boot items. timeout 5 specifies a 5 second delay before grub boots the default item.
timeout 5 color cyan/blue white/blue password --md5 $1$A9NHZ/$N.6k9riAFMbV/nfsZ2LnD1 does this old (obsolete & unsecure) doc work ? could it be an alternative creating a menu.lst cheating a bit ? i like the color line & the simplicity. Updated how-to : Set Grub2 boot password on Debian based system (June 9, 2017) (https://linoxide.com/linux-how-to/set-grub-password) if i install both ; does it lock, unlock, act as a backdoor, make the system unbootable erasing/removing the boot process ? and if i install 2 password for the same user , does it work ? it is just a question about how secure could be a grub password (e.g) if a hack (old how-to) is still allowed ... (i suppose all vulnerabilities are patched yet). # does a grub2 password secure (unhackable ?) really the o.s ? # should you recommend it as a safe measure ? -- Securely sent with Tutanota.