Security Question
After installing Ubuntu then leaving it for a few days I forgot my base user password. So, looking through the forums I came across a way to reser my password by booting in the "Recovery Mode" of GRUB then using the passwd command.
This worked fine but I then thought that if I install UBUNTU on workstations for non-priviledged users thew will also find it easy to change the base password and gain privileged access to the system. Is there a recognised method of preventing this? Thanks |
Quote:
Also consider setting a CMOS (BIOS) password. |
Quote:
Read more here: http://psychocats.net/ubuntu/security#recoveryrisk |
Thanks for your replies/suggestions.
Putting a password on the CMOS/BIOS would, of course, limit workstation access but in this case the workstation will be used as a general Internet access station by many users so the BIOS password would be distributed. I edited the /boot/grub/menu.lst file to include the command: password topsecret (as in the example) but I found that I could still select recovery mode from the grub menu. Maybe I have interpreted it wrong but I thought that this command limited access to the grub menu. Any ideas? Thanks |
Quote:
Wait, from "info grub": Code:
password [`--md5'] passwd [new-config-file] HTH |
Many thanks.
After a few tries I got it working. It seems that I needed to insert the command lock after every line that started with title. Although, reading the notes in menu.lst it seems that a Debian Update will overwrite my lock command. Cheers |
All times are GMT -5. The time now is 05:47 AM. |