lol.That still does not obviate the need for security at multiple levels or distinct steps.
Stuart Jansen wrote:
On Thu, 2007-04-26 at 14:41 -0600, Steve Alligood wrote:It is true that if you have physical access to a system, you can get around any boot security, but you are missing the point that every OS will eventually be used with a serial or console connection.I'll see your "every OS will eventually be used with a serial or console connection" and raise you "eventually every remote console will be able to boot from remote media". Sounds to me like a problem with the remote console, not the boot loader. ------------------------------------------------------------------------ /* PLUG: http://plug.org, #utah on irc.freenode.net Unsubscribe: http://plug.org/mailman/options/plug Don't fear the penguin. */
smime.p7s
Description: S/MIME Cryptographic Signature
/* PLUG: http://plug.org, #utah on irc.freenode.net Unsubscribe: http://plug.org/mailman/options/plug Don't fear the penguin. */
