home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!crdgw1!rdsunx.crd.ge.com!yeti!davidsen
- From: davidsen@yeti.crd.GE.COM (william E Davidsen)
- Newsgroups: alt.security
- Subject: Re: Password at Boot for PCs
- Keywords: pc password boot security
- Message-ID: <1992Nov23.213753.7951@crd.ge.com>
- Date: 23 Nov 92 21:37:53 GMT
- References: <BxAxnM.71G@minerva1.bull.it> <1992Nov7.172229.16974@mnemosyne.cs.du.edu> <1dmmrgINNo59@charnel.ecst.csuchico.edu> <1992Nov22.025526.18257@news.Hawaii.Edu>
- Sender: usenet@crd.ge.com (Required for NNTP)
- Reply-To: davidsen@crd.ge.com (bill davidsen)
- Distribution: alt
- Organization: GE Corporate R&D Center, Schenectady NY
- Lines: 20
- Nntp-Posting-Host: yeti.crd.ge.com
-
- The only reasonable security I've found is:
- 1. use AMI BIOS
- 2. set to boot from hard disk FIRST, only use floppy if HD is
- non-bootable.
- 3. put a password on the configuration.
- 4. Use any of the free/share/commercial progs in config.sys
- to ask a password for machine access.
-
- Notes: (1) other BIOS with this capability may exist. (2) If someone has
- enough physical access to the machine to take it apart and remove the
- CMOS battery they can get it to boot from floppy. Generally the problem
- is *undetected* access, or *fast* access, as from a curious fellow
- worker or student, rather than a professional industrial spy.
-
- It's a lot easier to limit physical security to keeping the case closed
- and on the desktop than it is to prevent all access and still have
- machine useful.
- --
- bill davidsen, GE Corp. R&D Center; Box 8; Schenectady NY 12345
- Keyboard controller has been disabled, press F1 to continue.
-