To: ShadowAce
Know what I want? Unlike most who are plain lazy, I want to implement a “timed” requirement for two logins to pass with two different credentials before mine can be rooted. That way even if one is breached there is a second to pass within a time limit or it locks up.
How would I do this?
10 posted on
10/03/2023 10:45:39 AM PDT by
Openurmind
(The ultimate test of a moral society is the kind of world it leaves to its children. ~ D. Bonhoeffer)
To: Openurmind
Know what I want? Unlike most who are plain lazy, I want to implement a “timed” requirement for two logins to pass with two different credentials before mine can be rooted. That way even if one is breached there is a second to pass within a time limit or it locks up. How would I do this
Not quite the same thing, but "port knocking" can give you additional protection.
11 posted on
10/03/2023 11:17:39 AM PDT by
zeugma
(Stop deluding yourself that America is still a free country.)
To: Openurmind
Give me physical access to ANY* computer, and it's mine. I don't need your credentials.
except for those with encrypted disks. That would take me a while longer
15 posted on
10/03/2023 1:36:23 PM PDT by
ShadowAce
(Linux - The Ultimate Windows Service Pack )
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson