> On Sun, 22 Mar 1998, Stelios Bounanos wrote:
>
> > But even then, people can use programs that run under dos-windoze to reset
> > the BIOS -- I've tried this with several different BIOSs with a _lot_ of
> > success!
> All you need to do is open the cover and reset the bios. There ia always
> a
On Sun, 22 Mar 1998, Stelios Bounanos wrote:
> But even then, people can use programs that run under dos-windoze to reset
> the BIOS -- I've tried this with several different BIOSs with a _lot_ of
> success!
All you need to do is open the cover and reset the bios. There ia always
a way to do thi
On Sat, 21 Mar 1998, Tom Diehl wrote:
> And a boot disk will bypass this and any other options you put in lilo.
> The only way to secure a machine it NOT to allow physical access.
> If they know about linux single they know how to use a boot disk.
> You are just kidding yourself if you think your
> And a boot disk will bypass this and any other options you put in lilo.
> The only way to secure a machine it NOT to allow physical access.
> If they know about linux single they know how to use a boot disk.
> You are just kidding yourself if you think your machine is secure.
A boot disk will
On Sat, 21 Mar 1998, Tom Diehl wrote:
> On Sun, 22 Mar 1998, Stelios Bounanos wrote:
>
> > The `restricted' option causes LILO to boot Linux without a password,
> > but if someone tries to pass any options to the kernel (including
> > single), they'll be asked for one.
>
> And a boot disk will
On Sun, 22 Mar 1998, Stelios Bounanos wrote:
> The `restricted' option causes LILO to boot Linux without a password,
> but if someone tries to pass any options to the kernel (including
> single), they'll be asked for one.
And a boot disk will bypass this and any other options you put in lilo.
T
The Right Thing(tm) to do is to append the following 2 lines:
parrword=whatever
restricted
at the end of the linux section of /etc/lilo.conf
Mine, for example looks like this:
boot=/dev/hda
map=/boot/map
install=/boot/boot.b
prompt
timeout=30
vga=7
image=/boot/vmlinuz
label=linux
On Fri, 20 Mar 1998, Magnus Solvang wrote:
> Quoting Tom Diehl ([EMAIL PROTECTED]):
>
> | Having said that do what was suggested before (comment out the prompt
> | directive in /etc/lilo.conf and rerun lilo) and you will have no more
> | boot prompt. You could also passwd protect lilo but then
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> I have seen a message thread on how to setup your
> rc files to do a "exec login" during the boot process
> allowing you to setup a
Actually, it was a article in the Linux Gazette in
Issue 19, July 1997
It explains in detail how to setup your m
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I have seen a message thread on how to setup your
rc files to do a "exec login" during the boot process
allowing you to setup a
"Hit Enter to continue boot process or type
the ROOT password to enter single user mode."
message at boot. As I remembe
Quoting Tom Diehl ([EMAIL PROTECTED]):
| Having said that do what was suggested before (comment out the prompt
| directive in /etc/lilo.conf and rerun lilo) and you will have no more
| boot prompt. You could also passwd protect lilo but then only you would
| be able to boot.
...and the machine
On Thu, 19 Mar 1998 [EMAIL PROTECTED] wrote:
> I can't have it boot straight into Linux because it also runs
> windows95. The problem is that the console is in an open lab and anyone
> could reboot and use linux single to gain root privs and I'm trying to
> remove this giant security hole. Can
>Date: Thu, 19 Mar 1998 12:03:08 -0500
>From: [EMAIL PROTECTED]
>Subject: Re: linux single
>I can't have it boot straight into Linux because it also runs
>windows95. The problem is that the console is in an open lab and anyone
>could reboot and use linux single to gain ro
I can't have it boot straight into Linux because it also runs
windows95. The problem is that the console is in an open lab and anyone
could reboot and use linux single to gain root privs and I'm trying to
remove this giant security hole. Can anyone help? I'd rather not have
to play with the lil
14 matches
Mail list logo