Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 12 Dec 2010 10:12:59 +0000
From:      Chris Rees <utisoft@gmail.com>
To:        "K. Yura" <yy.guest@gmail.com>, freebsd-questions@freebsd.org
Subject:   Re: pass for single user mode
Message-ID:  <AANLkTinkABjiwnhu4LwX9ud9GsVsOLanKOpbpz0b7o%2B1@mail.gmail.com>
In-Reply-To: <AANLkTikqNTmte40SeWup7TA-g6eFA2sVDK3CuRVVtg79@mail.gmail.com>
References:  <AANLkTimtCXcQVr0mvMbrvyRzD=DKyOTodGA1QxC013wW@mail.gmail.com> <AANLkTinpwFoMrrUGu7SfMMOVxi-ByFTx%2B5nY7q31Lf_c@mail.gmail.com> <AANLkTikqNTmte40SeWup7TA-g6eFA2sVDK3CuRVVtg79@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On 11 December 2010 16:55, K. Yura <yy.guest@gmail.com> wrote:
> 2010/12/11 Chris Rees <utisoft@gmail.com>
>>
>> Have a look at /etc/ttys.
>> Chris

> Thank you very much

No problem. Don't forget that although you've now made it non-trivial
to break into your computer with console access, it's still easy for a
physical attacker to:

- remove your hard drive
- boot from a USB key or CD or floppy etc
- mess with your BIOS settings.

This is why by default there's no root password for single user; if an
attacker has physical access you're screwed anyway!

Chris



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?AANLkTinkABjiwnhu4LwX9ud9GsVsOLanKOpbpz0b7o%2B1>