On Mon, Feb 2, 2009 at 3:27 PM, John Hornbuckle <[email protected]> wrote: > ... reset the BIOS password (generally involving opening the unit and > messing with a jumper, which can be tricky because some of our > units have locks to keep them closed ...
So, five seconds with a pair of open-end bolt cutters to remove the lock, and then 30 seconds to find the jumper on the mobo. :) > ... in order to boot from a CD/flash drive/whatever in order to wipe the > hard drive (which they would need to do, because the OS is locked > down and would be unusable to them off our network). When I get a new-to-me computer, I always wipe the hard drive and reinstall. I've never knowingly received stolen merchandise, but if I did, I would certainly wipe it! :) Hmmm, I wonder if one could report the Product Key from the OEM sticker to Microsoft as stolen? I think security cameras, locked doors, and a room security alarm would be more effective deterrent. Most of that's not possible for a lab that's supposed to be open unattended, though. When I was at university, they always kept an attendant in the labs while they were open; I'm guessing this is why. -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
