Date: Sun, 12 Dec 2010 10:12:59 +0000 From: Chris Rees <utisoft@gmail.com> To: "K. Yura" <yy.guest@gmail.com>, freebsd-questions@freebsd.org Subject: Re: pass for single user mode Message-ID: <AANLkTinkABjiwnhu4LwX9ud9GsVsOLanKOpbpz0b7o%2B1@mail.gmail.com> In-Reply-To: <AANLkTikqNTmte40SeWup7TA-g6eFA2sVDK3CuRVVtg79@mail.gmail.com> References: <AANLkTimtCXcQVr0mvMbrvyRzD=DKyOTodGA1QxC013wW@mail.gmail.com> <AANLkTinpwFoMrrUGu7SfMMOVxi-ByFTx%2B5nY7q31Lf_c@mail.gmail.com> <AANLkTikqNTmte40SeWup7TA-g6eFA2sVDK3CuRVVtg79@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On 11 December 2010 16:55, K. Yura <yy.guest@gmail.com> wrote: > 2010/12/11 Chris Rees <utisoft@gmail.com> >> >> Have a look at /etc/ttys. >> Chris > Thank you very much No problem. Don't forget that although you've now made it non-trivial to break into your computer with console access, it's still easy for a physical attacker to: - remove your hard drive - boot from a USB key or CD or floppy etc - mess with your BIOS settings. This is why by default there's no root password for single user; if an attacker has physical access you're screwed anyway! Chris
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?AANLkTinkABjiwnhu4LwX9ud9GsVsOLanKOpbpz0b7o%2B1>