"Many security controls are ineffective or can be overridden if
an attacker gets physical access to your hosts, especially if
attackers are able to reboot those hosts. For example, by rebooting
your Red Hat Enterprise Linux server, an attacker can sign into
single user mode and change your root password--achieving a total
compromise of your server.
"In this tip, I will look at how you can secure your GRUB boot
loader with a password that will prevent unauthorized access to
your hosts after a reboot..."
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.