On Mon, Feb 2, 2009 at 3:27 PM, John Hornbuckle
<[email protected]> wrote:
> ... reset the BIOS password (generally involving opening the unit and
> messing with a jumper, which can be tricky because some of our
> units have locks to keep them closed ...

  So, five seconds with a pair of open-end bolt cutters to remove the
lock, and then 30 seconds to find the jumper on the mobo.  :)

> ... in order to boot from a CD/flash drive/whatever in order to wipe the
> hard drive (which they would need to do, because the OS is locked
> down and would be unusable to them off our network).

  When I get a new-to-me computer, I always wipe the hard drive and
reinstall.  I've never knowingly received stolen merchandise, but if I
did, I would certainly wipe it!  :)

  Hmmm, I wonder if one could report the Product Key from the OEM
sticker to Microsoft as stolen?

  I think security cameras, locked doors, and a room security alarm
would be more effective deterrent.  Most of that's not possible for a
lab that's supposed to be open unattended, though.  When I was at
university, they always kept an attendant in the labs while they were
open; I'm guessing this is why.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to