Here's the thing though. I am planning a HUGE migration from Microsoft to Linux in a K-12 school system. This includes servers AND workstations. Now, trust me, I'm not fan of Microsoft, I downright despise them. However, would any kid in the network get his hand on a workstation and be able to start changing the root password? Not _any_ kid. He would at least have to know how to boot into single user mode, it's not like it's entered automatically or anything.
What type of security other than with the bootloader is there? Is there a way to turn off Single User Mode? If so, what are the implications of doing this? Hmmm. Probably not. However, there are only two ways of entering single user mode, as far as I know: 1. Via the bootloader 2. Using the "init" command. Now, to run init, you will have to be logged in as superuser, i.e. you can do it only if you know the root password already, so if you also set a bootloader password, you should be pretty safe. At least as far as single user mode entry is concerned. As someone else pointed out, it is also possible to get unrestricted access to the filesystem by booting from the installer CD or another hard drive... - Toralf _______________________________________________ Redhat-list mailing list [EMAIL PROTECTED] https://listman.redhat.com/mailman/listinfo/redhat-list