From owner-freebsd-questions Sat Jan 31 09:01:11 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id JAA03190 for questions-outgoing; Sat, 31 Jan 1998 09:01:11 -0800 (PST) (envelope-from owner-freebsd-questions@FreeBSD.ORG) Received: from phoenix.its.rpi.edu (dec@phoenix.its.rpi.edu [128.113.161.45]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id JAA03184 for ; Sat, 31 Jan 1998 09:01:08 -0800 (PST) (envelope-from dec@phoenix.its.rpi.edu) Received: from localhost (dec@localhost) by phoenix.its.rpi.edu (8.8.8/8.8.7) with SMTP id MAA11697 for ; Sat, 31 Jan 1998 12:00:59 -0500 (EST) (envelope-from dec@phoenix.its.rpi.edu) Date: Sat, 31 Jan 1998 12:00:59 -0500 (EST) From: "David E. Cross" To: freebsd-questions@FreeBSD.ORG Subject: FreeBSD boot banner (securing FreeBSD) Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG X-To-Unsubscribe: mail to majordomo@FreeBSD.org "unsubscribe questions" I have enabled the BIOS password on my server, and prevented booting to the 'A:' drive, but it seems that all someone needs to do to bypass that is create a FreeBSD floppy, and when the boot prompt comes up to do a 'sd(0,a)/kernel'. Is there any way to prevent this? -- David Cross UNIX Systems Administrator GE Corporate R&D