Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 23 Nov 2006 21:58:57 +0100
From:      "Christian Walther" <cptsalek@gmail.com>
To:        "Garrett Cooper" <youshi10@u.washington.edu>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: Password Security
Message-ID:  <14989d6e0611231258l2c432daawc0640f63485e71cf@mail.gmail.com>
In-Reply-To: <5DDF6D7C-4FF7-4857-B07E-4462F3C89F97@u.washington.edu>
References:  <2cd0a0da0611211941iae07787q3f433fb2c8ab1f22@mail.gmail.com> <200611230757.11410.GregoryC@stcinc.com> <5DDF6D7C-4FF7-4857-B07E-4462F3C89F97@u.washington.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
> Being able to Kensington lock the machine so that it can't be opened
> (thinking of Dells), you can prevent physical access to a large
> degree (only have to worry about people that can screw up the lock),
> and prevent people from taking the drive OR resetting the CMOS
> jumper, giving people access to the BIOS without a password (one
> thing that many people haven't mentioned about security so far).
> -Garrett

Sorry to disappoint you, but Kensington locks can easily be unlocked,
using a toilet paper roll, pen, and tape. We tried this at work
because my collegue protected his flat screen with it, but forgot his
key at home on the day we moved to a new office. We needed a bit
longer, thou...

The video is wmv, but I didn't find a version in another format (but
mplayer can play it): http://www.toool.nl/kensington623.wmv

I wonder if the data on this machine is as sensitive as this thread
suggests it... ;)



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?14989d6e0611231258l2c432daawc0640f63485e71cf>