From owner-freebsd-hackers Thu Jan 5 02:02:26 1995 Return-Path: hackers-owner Received: (from root@localhost) by freefall.cdrom.com (8.6.9/8.6.6) id CAA00770 for hackers-outgoing; Thu, 5 Jan 1995 02:02:26 -0800 Received: from relay-europe.ps.net (relay-europe.ps.net [160.110.96.10]) by freefall.cdrom.com (8.6.9/8.6.6) with SMTP id CAA00755 for ; Thu, 5 Jan 1995 02:02:21 -0800 Received: by relay-europe.ps.net (AIX 3.2/UCB 5.64/4.03) id AA10707; Thu, 5 Jan 1995 10:06:23 GMT Date: Thu, 5 Jan 1995 10:06:22 +0000 (GMT) From: Aled Morris Subject: Re: FreeBSD on SCHOOL SYSTEMS???? To: Sean Kelly Cc: spaz@u.washington.edu, FreeBSD-hackers@freefall.cdrom.com In-Reply-To: <199501041631.AA252817119@yarmouth.fsl.noaa.gov> Message-Id: Mime-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: hackers-owner@FreeBSD.org Precedence: bulk On Wed, 4 Jan 1995, Sean Kelly wrote: > John> How do you keep folks from sticking a boot disk in; > John> logging in as root, and spamming the whole system? > > With careful selection of PC BIOS. When I worked at a University we gave up on the idea of putting the machines in public rooms - not just because of boot-disk hackers, but simply because they had access to the power switch! I believe the current biggest threat is SIMM theft. Aled -- aledm@relay-europe.ps.net | tel +44 973 207987 Perot Systems Europe Ltd. | fax +44 181 476 2419