How to secure my laptop so that hacking by physical access is not possible?

1

I messed up my system earlier, I was greeted with a black screen, when booting in to Ubuntu. When I started up my laptop, I selected the recovery option from the grub menu, and chose fallback at root terminal. I saw that I was able to use the add user command, with it, I probably could use to create a privileged user on my machine.

Isn't that a security issue?

One could have stolen my laptop and at startup chose recovery and add another user, I'm fudged then. Including my data.

Come to think of it, even if you somehow remove that entry, one could boot from a live-CD, get a chroot up and running and then add another user, with the right privileges that allows it to see all my data.

If I set the BIOS to boot at my HD only, no USB, CD/DVD, Network startup, and set a BIOS password, it still wouldn't matter, because you'd still have that grub recovery startup entry.

I am fairly certain that someone from China, Russia can't hack my Ubuntu Trusty Tahr,...

0 0
2

by

blade19899

Last Updated September 21, 2015 11:01 AM

I messed up my Ubuntu, I only got a black when booting my Ubuntu. When I started up my laptop, I selected the recovery option from the grub menu, and choose fallback at root terminal. I saw that I was able to use the add user command, which I probably could turn into a privileged user on my machine.

Isn't that a security issue?

One could have stolen my laptop, and at startup chose recovery and add another user, I'm fudged then. Including my data.

Come to think of it, even if you somehow remove that entry, one could boot from a live-CD, get a chroot up and running, and then add another user, with the right privileges that allows it to muck everything up.

If I set the BIOS to boot at my HD only, no USB, CD/DVD, Network startup. And set a BIOS password, it still wouldn't matter. Because you'd still have that grub recovery startup entry.

I am fairly certain that someone from China,...

0 0
3

Not a blogger, but here goes . . Looking for a Windows Expert Software Technician for Edition 7 on a 64-bit OS \ Windows Professional \ HP Laptop Pavilion dv6 ( aka WEST764 ) who can help me secure my laptop and prevent an Rogue Arrogant Hacker (RAH) from making my life miserable.

Background 1: Let my guard, and left my laptop unsecure. Thought it was going to be OK, because I ran security software with Bit Defender, Kaspersky, Windows Security Essential, plus more. Yes, it was hard to get the software to play together, but I worked it out. RAH hacked me. Hired OfficeMax to debug, wiped clean, and then reload original software. Now laptop is kept behind locked doors, is hardwired to a router. Router was reset with new passwords. Laptop runs only Windows Essentials for security. Windows network and home-group settings are DISABLED. Remote Access is DISABLED. I go back to work.

Background 2: RAH hacks my laptop again. It is a mystery. I keep putting up new...

0 0
4

Travelling with a laptop can represent a significant

security

risk to your business. This is because the data it contains is far more vulnerable when you are on the move than when you use a laptop in the relative safety of your office or home environment.

It doesn't have to be stolen; because it takes just seconds for a hacker to slip a USB stick into a laptop when it is unattended to install malicious software or steal data. Even relatively unsophisticated hackers can run programs like Mailpassview from a USB stick to steal your email account details and email password.

There are steps you can take to reduce the risk. Here are 10 simple things you can do to help keep your laptop secure when you are on the go.

1.Use a password

Ensure that your Windows account is protected with a password. The laptop should be configured so that the password has to be entered every time you turn the machine on or when it comes out of hibernation, sleep or...

0 0
5

Hello everyone.

I just joined today, primarily to ask the following questions:

Here's the problem, and the symptoms. I unfortunately have a family member who has some serious emotional problems. This person, by definition, is a sociopath. He has also had drug related issues as well, and whether thats still an issue I dont know, as I dont deal with him anymore. But he's also got some friends who are simply really bad people.

So I've had problems in the past with theft, break-ins, accessing my computer without permission, etc. I am now concerned that its been accessed remotely. He does not live close to me, but he has friends who do.

I have a Dell Inspiron 1501 laptop with Win Vista. I have been noticing that every once in a while, at different times of day when I'm at home, the laptop will switch itself on without me touching it. I'll suddenly hear the characteristic two-tone noise that it makes, which is something like doot-doot, then the fan will turn...

0 0
6

It has been a matter of days when we found out about the flaws in AMD, ARM and Intel’s computer microchips that allowed attackers to carry out Spectre and Meltdown attacks. Since these microchips are widely used in almost all desktops/laptops, smartphones and tablets, therefore, the discovery sent out shockwaves among high-profile tech giants including Microsoft, Google, Mozilla, and Amazon. Security experts rushed to churn out security updates and patch the flaw. Seem like problems for Intel are far from over because another flaw has been discovered in Intel hardware by Finnish cyber security firm F-Secure.

In its official statement released on Friday, 12th January regarding the newly identified hardware flaw, F-Secure stated that it allows hackers to remotely access corporate laptops. However, the company has categorically denied that the new discovery has any connection with Meltdown and Spectre vulnerabilities.

More: A Malware That can Bypass Windows Firewall...

0 0
7

wikiHow's mission is to help people learn, and we really hope this article helped you. Now you are helping others, just by visiting wikiHow.

Direct Relief is a humanitarian nonprofit with a mission to improve the health and lives of people affected by poverty and emergencies. Recognized by Charity Navigator and Forbes for its efficiency, Direct Relief equips health professionals in the U.S. and throughout the world with essential medical resources to effectively treat and care for patients – without regard to politics, religion, or ability to pay.

Click below to let us know you read this article, and wikiHow will donate to Direct Relief on your behalf. Thanks for helping us achieve our mission of helping everyone learn how to do anything.


...
0 0
8

Is there any way to know how much of my data was exposed? Or stolen? Can I know if they really got my pictures? Or anything else?

This will depend on your operating system and what behaviour gets logged automatically. That you knew that you were hacked indicates the hacker wasn't covering their tracks very well.

Still, most service accounts when someone logs in will provide carte blanche access to all assets. So if a specific account was breached - assume they took everything. Otherwise it will depend on how much security logging the computer or online web service did and whether anyone will want to check these often cryptic audit logs for free.

Is there anyway to secure my network?

Yes. Many ways to secure a network. Too many list here. But you can start with this guide.

Or do I have to close my email accounts and change my laptop?

No - you don't need to close your accounts or sell your laptop. But you do need to reconfigure...

0 0
9

Luis C. wrote:

One, you call it PAC, Physical Access Control. I see it more often referred to a Electronic Access Control Systems, EACS, or ACS for short. But toe-may-toe, toe-maw-toe.

Second, you asked if there was a system that's never been hacked. Even if there was one, whether it's in psychical security or IT security, I'm sure the common wisdom would still be to assume, "Hasn't been hacked... yet." You're on the right track asking what do they use, but be cautious about asking whether it's been hacked or not. Remember back when all the Mac and Linux users who thought they couldn't be hacked because they weren't Windows? Then malware on those systems started becoming rampant as they came more into use.

Third, I think you may be over mixing several distinct aspects of ACS: security between of the credential to the reader, between the reader and the main system, and security accessing the system in the client/server role, which would fall under the...

0 0
10

1. Create a Firmware Password

When you enable a firmware password, the user must enter it before performing tasks like booting from a disk, resetting PRAM, and most importantly, entering single-user mode. Single-user mode is vital for many of our tutorials, like our article on how to create a new administrator account. If a firmware password is enabled, the hacker simply cannot use that tutorial.

Of course, there are ways around a firmware password (as detailed in this article), but that can easily be prevented by not allowing physical access, which we’ll talk about later.

If you want to learn how to set up a firmware password, you can take a look at this article by Apple.

2. Turn off Remote Login

Whenever somebody tries to SSH into your computer, they need remote login to be enabled. If you disable it, they won’t be able to remotely access your computer. I only turn remote login on when I need it for a specific purpose for a short period of...

0 0
11
...
0 0
12

We live in a world that’s becoming ever more dependent on the various digital products at our disposal. From the average man on the street making purchases on his phone to huge multinational companies taking hundreds of thousands of dollars in payments from wide and varied customer bases, technology has become an indispensable facet of modern living.

The proliferation of devices has undeniably made shopping, communication and organisation easier than ever before, but what are the implications for those concerned with security?

Our dependence on computers has resulted in huge amounts of very sensitive, very valuable information being stored in, physically speaking, increasingly small packages.

Obviously, digital based security has increased along with the popularity of digital based products, but a comprehensive IT security policy isn’t enough if you want to sleep easy…you’re also going to need a thorough physical security policy.

Why is a Physical...

0 0