> And let's not forget the old standby of simply removing the hard disk, > attaching it to another system, and getting at any yummy data that way. > Security starts with PHYSICAL security, as any security guru will tell > you. If a system is not physically protected from unauthorized access, > not much else will be very effective. That's a valid point, tought some intruders don't want to steal the machine or the hard drive, as that would make the attack extremely evident. Instead, it's easier to break into single-user mode and create a user account used to remotely access the machine by any other means. -- fedora-docs-list@xxxxxxxxxx To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-docs-list