Different actions on different passwords?
Steve Searle
steve at stevesearle.com
Thu Jan 2 16:32:16 UTC 2014
Around 12:43am on Tuesday, December 31, 2013 (UK time), Patrick O'Callaghan wrote:
> Conclusion: better look for some other way to cover your tracks, and note
> that a forensic investigation can be carried out without having you log in
> at all.
Just to emphasise what Patrick says, if you boot Linux into singe user
mode, you can get root access without needing a password, which would
bypass any setup you had done this way.
You would be better off using disc encryption, and claiming that you
used a long pass phrase which you had written down rather than
remembered, and that you had destroyed the paper it was written on.
Steve
--
Website: www.stevesearle.com
16:28:31 up 14 days, 23:57, 1 user, load average: 0.01, 0.04, 0.01
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 181 bytes
Desc: not available
URL: <http://lists.fedoraproject.org/pipermail/users/attachments/20140102/a9837769/attachment.sig>
More information about the users
mailing list