Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: ShadowAce

Know what I want? Unlike most who are plain lazy, I want to implement a “timed” requirement for two logins to pass with two different credentials before mine can be rooted. That way even if one is breached there is a second to pass within a time limit or it locks up.

How would I do this?


10 posted on 10/03/2023 10:45:39 AM PDT by Openurmind (The ultimate test of a moral society is the kind of world it leaves to its children. ~ D. Bonhoeffer)
[ Post Reply | Private Reply | To 1 | View Replies ]


To: Openurmind
Know what I want? Unlike most who are plain lazy, I want to implement a “timed” requirement for two logins to pass with two different credentials before mine can be rooted. That way even if one is breached there is a second to pass within a time limit or it locks up.

How would I do this

Not quite the same thing, but "port knocking" can give you additional protection.

11 posted on 10/03/2023 11:17:39 AM PDT by zeugma (Stop deluding yourself that America is still a free country.)
[ Post Reply | Private Reply | To 10 | View Replies ]

To: Openurmind
Give me physical access to ANY* computer, and it's mine. I don't need your credentials.

except for those with encrypted disks. That would take me a while longer

15 posted on 10/03/2023 1:36:23 PM PDT by ShadowAce (Linux - The Ultimate Windows Service Pack )
[ Post Reply | Private Reply | To 10 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson