Skip to main content

hard drive - How to prevent my client from hacking into the demo computer I provide him?


I need to provide a customer of the company I work at, a laptop computer with a demo software that will run on it.


The software is for display only and doesn't require any user interaction via keyboard or mouse.


I need the computer to disable all device inputs and the hard drive to be encrypted, so only this computer can run. I want to prevent the customer from accessing the computer while it works and prevent the option of removing the hard drive and using it on a different computer.


Does anyone know of any hardware computer\hard-drive combo that can do this?


Thanks.



Answer



Check your laptop's BIOS at boot, look around for options like hard drive encryption or "ATA Hard Disk Lock" (not encryption, but I don't think most drives have any mechanism that would allow you to bypass the password).


You can shoot epoxy into the firewire port to prevent them from attaching a PCI memory reader debugging tool.


Update


The fact that it's Linux gives you some more flexibility. :) You can remove the usbhid.ko, hid.ko, and similar kernel modules from the system. Look through lsmod(8) output and remove anything that looks like it'd be useful for the trackpad or keyboard or nipple-mouse. Delete the firewire modules. Maybe even the serial and parallel modules. (If you're not using them, it won't hurt to be rid of them.)


You'll need to lock down grub as well, so that your client can't just edit the kernel boot line and add init=bash or init=getty /dev/ttyS01 or something else similarly annoying.


You might also want to use a tool such as AppArmor, SElinux, TOMOYO, or SMACK. Any of these mandatory access control tools can prevent an application from escaping a well-defined set of privileges. As I've worked on the AppArmor system for a decade now, it's the one I know best and the one I'd recommend :) but any of these tools can help lock down every mechanism that your client can interact with the computer.


(To tell a small diversionary tale, we took an AppArmor-confined system to the DEFCON Capture The Flag contest for several years; one year required allowing users to telnet in as root with a specific password. AppArmor made it easy to confine the telnetd daemon, the shell it started, and then the programs that the 'scorebot' needed to run. We never won the CTF contests, but we never got rooted, either. We never needed to worry about physical attacks because everyone who was defending was known to us.)


Best of luck.


Comments

Popular Posts

Use Google instead of Bing with Windows 10 search

I want to use Google Chrome and Google search instead of Bing when I search in Windows 10. Google Chrome is launched when I click on web, but it's Bing search. (My default search engine on Google and Edge is http://www.google.com ) I haven't found how to configure that. Someone can help me ? Answer There is no way to change the default in Cortana itself but you can redirect it in Chrome. You said that it opens the results in the Chrome browser but it used Bing search right? There's a Chrome extension now that will redirect Bing to Google, DuckDuckGo, or Yahoo , whichever you prefer. More information on that in the second link.

linux - Using an index to make grep faster?

I find myself grepping the same codebase over and over. While it works great, each command takes about 10 seconds, so I am thinking about ways to make it faster. So can grep use some sort of index? I understand an index probably won't help for complicated regexps, but I use mostly very simple patters. Does an indexer exist for this case? EDIT: I know about ctags and the like, but I would like to do full-text search. Answer what about cscope , does this match your shoes? Allows searching code for: all references to a symbol global definitions functions called by a function functions calling a function text string regular expression pattern a file files including a file

How do I transmit a single hexadecimal value serial data in PuTTY using an Alt code?

I am trying to sent a specific hexadecimal value across a serial COM port using PuTTY. Specifically, I want to send the hex codes 9C, B6, FC, and 8B. I have looked up the Alt codes for these and they are 156, 182, 252, and 139 respectively. However, whenever I input the Alt codes, a preceding hex value of C2 is sent before 9C, B6, and 8B so the values that are sent are C2 9C, C2 B6, and C2 8B. The value for FC is changed to C3 FC. Why are these values being placed before the hex value and why is FC being changed altogether? To me, it seems like there is a problem internally converting the Alt code to hex. Is there a way to directly input hex values without using Alt codes in PuTTY? Answer What you're seeing is just ordinary text character set conversion. As far as PuTTY is concerned, you are typing (and reading) text , not raw binary data, therefore it has to convert the text to bytes in whatever configured character set before sending it over the wire. In other words, when y...

linux - Impossible to connect with ldap

IP : 192.168.0.70 (dell) DIT : (seen through ldapphpadmin) And for patricia duchesne: dn cn=patricia duchesne,ou=users,dc=memorandum,dc=pro cn patricia duchesne gidnumber 501 givenname patricia homedirectory /home/users/pduchesne loginshell /bin/bash objectclass inetOrgPerson | posixAccount | top sn duchesne uid pduchesne uidnumber 1000 userpassword {MD5}eFI0F0... IP : 192.168.0.60 (pb) NSSWitch is configured : cat/etc/nsswitch.confpasswd:filesldapgroup:filesldapshadow:filesldapgshadow:fileshosts:filesmdns4minimal[NOTFOUND=return]dnsnetworks:filesprotocols:dbfilesservices:dbfilesethers:dbfilesrpc:dbfilesnetgroup:nissoisldapauth: cat /etc/auth-client-config/profile.d/ldap-auth-config [lac_ldap] nss_passwd=passwd: files ldap nss_group=group: files ldap nss_shadow=shadow: files ldap nss_netgroup=netgroup: nis and libnss : $ cat /etc/libnss-ldap.conf uri ldap://192.168.0.70 base dc=...