From owner-freebsd-questions Fri Mar 15 18:25: 1 2002 Delivered-To: freebsd-questions@freebsd.org Received: from smtp.delfi.lv (smtp.delfi.lv [195.2.96.248]) by hub.freebsd.org (Postfix) with ESMTP id E2E5937B659 for ; Fri, 15 Mar 2002 18:22:34 -0800 (PST) Received: from webmail (webmail.delfi.lv [195.2.96.247]) by smtp.delfi.lv (8.8.8/8.8.6/8.8.0) with SMTP id g2G2MYk30470 for ; Sat, 16 Mar 2002 04:22:34 +0200 Message-Id: <200203160222.g2G2MYk30470@smtp.delfi.lv> To: questions@freebsd.org From: warrior@mailbox.riga.lv Subject: root password Date: Sat, 16 Mar 2002 02:22:34 GMT X-Mailer: Endymion MailMan Standard Edition v3.0.26 Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG Is the any way to secure FreeBSD if an intruder HAS the access to *Reset* button and theres no passwords on booting/etc? (Let's consider this option) so, the following combination wouldn't work: *reset* boot -s mount -u / mount -a passwd root exit Thanks. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message