On Fri, 24 Jan 2003, camthompson wrote:

> consider this (I'm trying to make a network more secure) :
> A user enters grub upon bootup and hits "e" to edit the Linux boot
> procedure and then continues to boot into single user mode, and he then
> chagnes the root password to whatever he suits.... the user who did this
> is eventually tracked down and taken care of.
>
> Now, how would I prevent this from happening in future instances?

You can also let Linux ask for the root password before going into single
user mode. Together with the BIOS / bootloader password, this could be a
showstopper for the not so smart user.

But stopping somebody to get into that machine who has physical access and
a bit knowledge, is almost impossible.

Regards,

Richard.

----
Paul Vixie in an interview with Sendmail.net:

Now that the Internet has the full spectrum of humanity as users,
the technology is showing its weakness: it was designed to be
used by friendly, smart people. Spammers, as an example of a class,
are neither friendly nor smart.

Reply via email to