Concerning Linux boot security?
I saw a definition concerning linux boot access:"Boot access is root access". This makes the fact that if someone has physical access to the linux server, he can get root access and copy protected files.
Moreover, if a linux application server has to be packaged and installed "Physically" in companies this will give them access to the files and they can copy them illegally.
I heard of LIDS (Linux Intrusion Detection System) but I couldn’t understand the boot access security.
My question:
Is there a boot level security that enables the fact of packaging server applications and install them in companies without the risk of the code being stolen (especially if it’s in a scripting language php, asp)
Tagged with: access security • application server • intrusion detection system • language php • level security • lids • Linux • linux application • linux server • risk • scripting language • server applications
Filed under: Linux Applications
Like this post? Subscribe to my RSS feed and get loads more!
11 year linux user here, no idea what you mean.
Right if someone has physical access to any computer linux or not they can get root access and "own" the computer/server.
Linux applications are installed by the administrator/root of the the server. There is no need to give any person except the administrator/root physical access to the server. Most applications in linux are installed remotely by the administrator/root.
All linux programs (not user generated files) are free to anyone to use. They cannot be stolen if they are freely available. The code is freely available, including scripting language php,asp.
Boot security is the root password. Without it you can’t get root access. (Physical access to the computer means that you can put the disk drive into another computer, running another operating system, and copy any files from it that you like. Security against that is a guy with a firearm, or at least a burglar alarm.)