Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Is NVRAM information on a given device only accessible through a GUI/ command line NVRAM dump on a particular device or is NVRAM information more like a harddrive that could be mounted on another device?
Is NVRAM information on a given device only accessible through a GUI/ command line NVRAM dump on a particular device or is NVRAM information more like a harddrive that could be mounted on another device?
No way to answer your question as posted. We will need actual details on what you mean, what device(s) you want to probe, version/distro of Linux, etc., before we can even *TRY* to guess.
What is your goal? Can you clearly explain what you're trying to do?
Wish to understand so as to know whether a password on say an old WRT54GL or even active HP, Epson, Brother, or whatever printer could be recovered if one wished to. Then can weigh risk in using non-unique password on these devices that use on other more important things.
Wish to understand so as to know whether a password on say an old WRT54GL or even active HP, Epson, Brother, or whatever printer could be recovered if one wished to. Then can weigh risk in using non-unique password on these devices that use on other more important things.
There is a huge difference between it **COULD** be done, and how easily it can be done. If you'd want to spend the time prying chips off boards, shoving them into EPROM readers, getting that going, decoding the information, etc., then yes...it COULD be done.
Are you going to spend many hours doing it, or are you just going to do a factory-reset in 10 seconds, and set your own password?
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.