No. Nien. Nada. Zilch. Nunca. Bubkis.

Encrypted hard disks/drives/images are encrypted through and through. A root password is defenseless against a boot image - I can (and have, mind you, many times) take over a system using just a bootable CD or USB. I even reverse-engineered part of a vendor’s platform to show them exactly how prone to attack their hardware was.



On Feb 27, 2014, at 10:34 PM, paul g <pj.world at hotmail.com> wrote:

> A simple question: Do strong passwords on a unencrypted harddisk 'root or sudo users' prevent really any sense of security if one chooses to boot into the system using a,an  'prefabbed .iso' or run a program that could search for a plain text password such as 'plain text'. Would the kernel version matter for security reasons in this event?
> 
> Thank you, 
> 
> 
> _______________________________________________
> TCLUG Mailing List - Minneapolis/St. Paul, Minnesota
> tclug-list at mn-linux.org
> http://mailman.mn-linux.org/mailman/listinfo/tclug-list

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.mn-linux.org/pipermail/tclug-list/attachments/20140227/5c1484c5/attachment-0001.html>