Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Today I booted ubuntu from a flash drive at school, just to play around with it. Unfortunately, the computer teacher somehow found out after the fact, first pulling in a classmate and questioning him, then pulling me in. It soon became apparent that booting another operating system went against the school's electronics policy.
While I had no knowledge of this, I am curious as to how she knew that somebody had booted Linux. Students have to log into provided user accounts to access the computers, but to be honest I don't know much about this sort of thing.
Could explain to me how she was able to find out that somebody had used Linux?
I'm assuming this is a High-School. Most school systems have proxy filters set up, so your user-agent string from the browser, which will specify windows/mac/linux, was logged. Schools don't like booting from a usb because it takes the PC outside the controlled school ecosystem.
The new Core i3-7 chips have backdoors into the computer even when turned off. They do not rely on ANYthing on the HD to "come alive". He could have something monitoring each computer and you cannot stop him easily.
The new Core i3-7 chips have backdoors into the computer even when turned off. They do not rely on ANYthing on the HD to "come alive". He could have something monitoring each computer and you cannot stop him easily.
“Secret” 3G Intel Chip Gives Snoops Backdoor PC Access
Intel Core vPro processors contain a “secret” 3G chip that allows remote disabling and backdoor access to any computer even when it is turned off.
*
The promo also highlights the ability for an administrator to shut down PCs remotely “even if the PC is not connected to the network,” as well as the ability to bypass hard drive encryption.
*
“Core vPro processors contain a second physical processor embedded within the main processor which has it’s own operating system embedded on the chip itself,” writes Jim Stone. “As long as the power supply is available and in working condition, it can be woken up by the Core vPro processor, which runs on the system’s phantom power and is able to quietly turn individual hardware components on and access anything on them.”
Although the technology is being promoted as a convenient way for IT experts to troubleshoot PC issues remotely, it also allows hackers or NSA snoops to view the entire contents of somebody’s hard drive, even when the power is off and the computer is not connected to a wi-fi network.
It also allows third parties to remotely disable any computer via the “secret” 3G chip that is built into Intel’s Sandy Bridge processors. Webcams could also be remotely accessed.
*
The ability for third parties to have remote 3G access to PCs would also allow unwanted content to be placed on somebody’s hard drive, making it easier for intelligence agencies and corrupt law enforcement bodies to frame people.
“The bottom line? The Core vPro processor is the end of any pretend privacy,” writes Stone. “If you think encryption, Norton, or anything else is going to ensure your privacy, including never hooking up to the web at all, think again. There is now more than just a ghost in the machine.”
Sounds like IPMI to me, and all of the rumors also appear to stem from the ONE undocumented source, which is full of crap.
I mean c'mon, do you really think intel has slapped in a separate processor, flash, RAM, 3G modem, AND a 3G antenna capable of making it through the heatsink, through the CPU case, through your house, and to the 3G network, all without increasing the size or power requirements of the processor, with included data fees, for free?
The sub-processor can USE your peripherals, including a 3G modem if you have one, but it doesn't have its own. That article is nothing more than sensationalist BS...just look at the site that it's on for god's sake.
As for the OP's question, I'm going with a proxy server and user-agent.
Last edited by suicidaleggroll; 02-17-2014 at 05:02 PM.
The Intel vPro technology is a feature of certain Intel chipsets (and yes, it is their version of IPMI). It has nothing at all to do with the Core i-CPUs.
Another reason the teacher may know is because often in a computer lab environment, the mentor monitors each station in order to view progress etc. So they have remote desktop capabilities that puts all the clients online in their view, they can then simply click and view what the student is doing.
If the client does appear or does not connect like it usually does, it is normally pretty easy to understand the computer is not behaving. If the student seems busy working on the machine, then that could be cause for alarm as well.
If the school has a policy, does it matter? It is still wrong.
I suppose I could get past it. I am unwilling to assist in hacking. The simple discussion of the issue is in effect teaching the kid how to get past the rules.
Distribution: Debian Wheezy, Jessie, Sid/Experimental, playing with LFS.
Posts: 2,900
Rep:
In Australia the Federal Government supplied laptops and they had a light on the lid. Windows light on, others light off. Teacher sits at the front of the room counts the lights, 30 laptops 29 lights the options are
1. someone has not started their machine (a requirement at the start of the lesson).
2. the laptop has a broken light and needs to be sent in for repair (student is required to let school know as soon as there is a problem).
3. someone is using a different OS to the one that was pre-installed (student gets into trouble).
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.