we have had numerous people stealing ram from machines, either sneakily replacing 128mb dimms with 64mb ones, or just taking ram left right and centre from every machine they can. Still working on ways to avoid this, as DELL cases are notoriously easyb to open, dont even need a screw driver, but the new ones have alarmsa that go off if the case weas removed, allowing you to check the last person who had access, not to mention the dell startup screen that hides the memory count, as do IBM, Compaq, and Gateway machines as well. Patrick Kelso junior unix geek Davnet ltd. ( no that isnt my real signature but it sums me up better ;) > -----Original Message----- > From: Howard Lowndes [mailto:[EMAIL PROTECTED]] > Sent: Friday, 15 September 2000 2:15 PM > To: Angus Lees > Cc: [EMAIL PROTECTED] > Subject: Moving OT a bit [was] Re: [SLUG] Re: Proceedure for > preventing > 'linux single' at lilo promp t > > > I did hear a rumour that RAM theft is a problem in corporate > environments. Does anyone have any first hand experience of just how > prevelent it might be. > > -- > Howard. > ______________________________________________________ > LANNet Computing Associates <http://www.lannet.com.au> > > On Fri, 15 Sep 2000, Angus Lees wrote: > > > On Fri, Sep 15, 2000 at 01:21:59PM +1000, Stephen Mills wrote: > > > 1) be reminded that if a person has physical access to > your linux machine, > > > they can usually have full access to all information > within a few mins with > > > a boot floppy > > > > > > 2) you can set a password on the lilo prompt to prevent > them from booting an > > > image without the proper password, but rule 1 still > applies, check out > > > /usr/doc/lilo-* for more info > > > > > > 3) put your server under lock and key if its a problem > > > > or in a lab-like environment: > > > > set to only boot from harddrive > > > > password protect the bios > > > > password protect lilo > > > > padlock the case closed (or put the case in a lockable steel cage) > > (*make sure people can't just poke the 5.25 cover off, and reach in > > anyway*) > > > > make sure that the machine boots to sulogin on single user > > (ie: failed fsck) > > > > and then you should be reasonably safe. floppy / cdrom can > be accessed > > using the normal permissions (don't allow suid or devices on those > > media tho..) > > > > > > > > -- > SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/ > More Info: http://slug.org.au/lists/listinfo/slug > -- SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/ More Info: http://slug.org.au/lists/listinfo/slug
