You are not logged in.
Pages: 1
Hi ppl,
as a new (1 year) linux user, i follow the usual security guidelines - ie, no root login, only wheel users, and for all system activities i use su/sudo. now, even with all those security measures the local station can still be very easily attacked by using a live-cd and mount my drives, therefor no real security achieved, even with all the normal security guidelines.
so, i would like to ask - isn't it best to secure the pc using the bios password or encrypted filesystem (other ideas will be greatly appreciated) and then allow root login via local only? i see no security holes in this, on the contrary - i think its more secure since i can disable the root user and only allow local root logins via pam. but im just a newbie... your thoughts please?
tnx in advance,
z4ziggy
Offline
Mr Green
Offline
tnx for the quick reply.
can i thus deduce that disabling root and allowing only local root logins via pam (and since root is disabled - it will be passwordless ) is not much for a security hole comparing to current situation?
tnx in advance,
z4ziggy
Offline
now, even with all those security measures the local station can still be very easily attacked by using a live-cd and mount my drives
... you forgot baseball bats.
Offline
generally, theres is something to be said for physical security. Even if someone can't get the data off your box or mess with it, they could always just pull the ethernet cable out. Sometimes that can be just as bad...
"Be conservative in what you send; be liberal in what you accept." -- Postel's Law
"tacos" -- Cactus' Law
"t̥͍͎̪̪͗a̴̻̩͈͚ͨc̠o̩̙͈ͫͅs͙͎̙͊ ͔͇̫̜t͎̳̀a̜̞̗ͩc̗͍͚o̲̯̿s̖̣̤̙͌ ̖̜̈ț̰̫͓ạ̪͖̳c̲͎͕̰̯̃̈o͉ͅs̪ͪ ̜̻̖̜͕" -- -̖͚̫̙̓-̺̠͇ͤ̃ ̜̪̜ͯZ͔̗̭̞ͪA̝͈̙͖̩L͉̠̺͓G̙̞̦͖O̳̗͍
Offline
Pages: 1