From owner-freebsd-questions Mon Oct 23 6: 7: 4 2000 Delivered-To: freebsd-questions@freebsd.org Received: from gilberto.physik.rwth-aachen.de (gilberto.physik.rwth-aachen.de [137.226.30.2]) by hub.freebsd.org (Postfix) with ESMTP id BC41437B479 for ; Mon, 23 Oct 2000 06:07:02 -0700 (PDT) Received: (from kuku@localhost) by gilberto.physik.rwth-aachen.de (8.9.3/8.9.3) id PAA69534 for questions@freebsd.org; Mon, 23 Oct 2000 15:06:58 +0200 (CEST) (envelope-from kuku) Date: Mon, 23 Oct 2000 15:06:58 +0200 (CEST) From: Christoph Kukulies Message-Id: <200010231306.PAA69534@gilberto.physik.rwth-aachen.de> To: questions@freebsd.org Subject: secure boot Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Is there a way to make FreeBSD absolutely safe against rebooting and getting into super user mode, e.g. by interrupting the boot process, ^C into single user or booting into single user mode? -- Chris Christoph P. U. Kukulies kuku@gil.physik.rwth-aachen.de To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message