Don’t forget your hardware

Hard Hacks

Article from Issue 140/2012
Author(s):

Now that your networks are secure and you’ve convinced your users to secure their passwords and software, it’s time to turn your attention to your hardware to keep it from being attacked.

This month, it’s back to the physical world – specifically, hacking systems via hardware. In security, sys admins usually focus on remote attacks (because anyone on the Internet can hit you) and local, shell-level attacks (because you can’t trust all users – or trust them to secure their passwords and so forth properly). Rarely do administrators pay much attention to physical attacks because, face it, someone with physical access and time can bypass virtually all security measures or simply modify the system so that, for example, after it boots up, it records your passwords to decrypt the hard drive.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Securing Thunderbolt

    The Thunderbolt interface supports extremely fast data transfer rates, but be careful about what you plug into your port, because Thunderbolt devices access memory directly. We'll show you some Linux tools for locking down your Thunderbolt interface.

  • Controlling a Smart Plug

    You could spend hundreds of dollars on specialized IoT appliances and fixtures, or you could just hack a smart plug and talk to it with your Linux system.

  • MainActor

    The MainActor video editing software may appear to have only a rudimentary title generator. But with some tricks and special effects, MainActor can give you some impressive opening credits.

  • Bluetooth Hacks

    The user rules in Linux – if you know where you’re going. This month the trail leads deep into the Linux Bluetooth stack.

  • OpenVPN

    Wireless networks are practical but dangerous at the same time.WEP encryption is unlikely to stop an attacker. But help is at hand in the form of add-on security measures such as an encrypted OpenVPN tunnel.

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News