Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
The problem here is that anyone with physical access to the device can bypass any software security measures. You can protect your data with encryption but there's nothing that can stop someone accessing the device itself by resetting BIOS passwords, pulling out hard drives and so on.
How would your 3rd party power management software stop me if I pulled your computer's power cord out, opened the box and removed the harddrive and plugged it into my computer?
If a hacker has managed to break into your computer with root access then he/she can already do anything they want no matter what power management software you use. If they've broken in but don't have root access then control over power management isn't going to help them - all they can do is reboot or shutdown the computer, they can't reveal or set any passwords or access controls doing that.
dude, use your imagination...............suppose a hacker burns your hard disk or webcam by directing more power to it ! it is possible if a software takes over power management.........and power management becomes complex and sophisticated ............. i am talking about the future
it is possible if a software takes over power management
No its not. Not with a standard power supply anyway, you'd have to build your own power supply with a nice little short circuit switch or something like that.
Quote:
i am talking about the future
Anythings possible but why would the manufacturers of future power supplies build in a 'fry the computer' function anymore than present day manufacturers do?
Originally posted by abunsair dude, use your imagination...............suppose a hacker burns your hard disk or webcam by directing more power to it ! it is possible if a software takes over power management.........and power management becomes complex and sophisticated ............. i am talking about the future
Well, I thought you were trying to discuss Linux, not some phantasy. It's already been said that your imaginary concepts don't apply in the real world.
I'm not really trying to flame. Just trying to educate.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.