home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!cs.utexas.edu!sun-barr!ames!agate!stanford.edu!rock!concert!duke!news.duke.edu!bullnext.mc.duke.edu
- From: low00001@bullnext.mc.duke.edu (Richard Low)
- Newsgroups: comp.sys.novell
- Subject: Re: Hack.exe
- Message-ID: <7212@news.duke.edu>
- Date: 20 Nov 92 14:57:16 GMT
- References: <jdsmith.50.722206331@novell.com>
- Sender: news@news.duke.edu
- Lines: 31
- Nntp-Posting-Host: homenext.mc.duke.edu
-
- In article <jdsmith.50.722206331@novell.com> jdsmith@novell.com (Doug Smith)
- writes:
- | In article <7168@news.duke.edu> low00001@bullnext.mc.duke.edu (Richard Low)
- writes:
- | >The basic premise behind server security is physically securing the box.
- | >Getting into a server by loading an NLM is pretty simple, you just have to
- | >keep prying hands off your server. I mean, anybody can cause damage by
- | >just pulling the plug!
- | >
- |
- | Also, you can secure the console (via a password). This restricts NLMs
- | from being loaded from anywhere except SYS:SYSTEM. If your users don't
- | have access to this subdirectory, such an NLM can't be used.
- |
- | Doug Smith
- | Novell
- | jdsmith@novell.com
-
- Ah, but as Eric J. Schwertfeger pointed out in his follow up posting,
- physicall access to a server is the determining factor. Even if the console
- is secured, I can kill the power (and probably some files) to bring the
- server down. Then all I need is a boot floppy with SERVER.EXE and my set
- password NLM on it and I can do my thing.
-
- The bottom line is, if you want to secure your server, secure the box! IMHO
-
- --
- Richard Low
- Duke University Medical Center
- low00001@bullnext.mc.duke.edu
- NeXT Mail welcome
-