Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
wolrah
May 8, 2006
what?

RFC2324 posted:

My take on bios passwords is that anyone who is in a position to type it is in a position to open the case and reset your BIOS.
Obviously if someone steals your computer it's not going to do a drat thing to stop them from doing anything other than seeing what your current settings are, but if the computer is not under their complete physical control it may still stop them, slow them down, or at the least provide a warning to an attentive user that something has happened.

Think about a school computer lab for example. Most desktop PC cases have the ability to be physically locked shut with a padlock. Combine that with a BIOS admin password and boom, no more students booting live CDs to reset local admin passwords and/or install keyloggers on the teacher's machine. Same basic principle could apply to most business desktops too, one simple padlock makes an unauthorized CMOS reset require destructive entry, which will generally raise suspicion in a public or semi-public area.

If you can assume reasonable physical security, a BIOS password can be quite effective.

There's also the potential for an attentive user to notice their settings had been reset if any of them are particularly obvious (full-screen logo, boot password, unusual boot options, virtualization, etc.) though that's of course a specific niche.

Adbot
ADBOT LOVES YOU

wolrah
May 8, 2006
what?

tuyop posted:

Are there any ways for me to totally brick the system? Like if I format windows or try to boot into linux from a USB or ungracefully replace my SSD with a mirrored SSD?
No. Secure Boot will just refuse to boot if you try to select an unsigned bootloader while it's enabled.

The worst thing you as a user could do without just intentionally overwriting things would be deleting the default keys. Most BIOSes have a simple button to restore them and if not they're widely published. Unless you're looking to sign your own kernels/bootloaders and want to prevent Microsoft-signed content from running you have no reason to ever touch the keys.

If you're just running Windows and/or major Linux distros (Ubuntu, Debian, Red Hat, CentOS) you basically have to go out of your way to break it and the worst case scenario is you have to disable it to boot.

wolrah fucked around with this message at 17:42 on Aug 7, 2020

wolrah
May 8, 2006
what?
I use the Chrome password manager for the majority of my passwords to inconsequential sites because it's convenient and works really well with an Android phone.

If someone breaks in to my Gmail accounts they can reset most of those passwords anyways, so *shrug*

My "important" passwords like banking, the Gmail accounts, etc. are stored in a separate KeePass database that I sync through my home server.

wolrah
May 8, 2006
what?

Booyah- posted:

So my windows defender just cause a file Uwamson.A!ml which seems pretty high risk.

I read through the OP and am just confirming that the only way to be safe is to reinstall my OS, is that correct?

e: to be clear nothing happened other than windows warning me about the file that was contained in a .zip file. I'd unpacked the zip and that's all

It seems that signature is associated with crypto mining. Were you attempting to mine crypto of some variety? If so it might be just the antivirus being overzealous, a lot of them will flag all cryptominers as suspicious in the same way as game cracks and such.

If you were not attempting to mine crypto it seems someone was and I'd consider the machine to be compromised.

wolrah
May 8, 2006
what?
If you don't have a strong reason to use something else (usually some kind of corporate AV management requirement), just use Defender.

All the best antivirus products are about equal at doing what they're supposed to be doing, and with Defender you can be confident that it's not also tampering with things it shouldn't be to do dumb poo poo you don't need like so many "security suite" products tend to do.

I think at this point every single one that tried to offer web filtering as part of their package did something that effectively broke TLS for the whole system. Third party antivirus is as likely to introduce a security hole as it is to protect against one being used.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply