Jump to content




Limit disk boot at startup


  • You cannot reply to this topic
30 replies to this topic

Poll: Limit disk boot at startup

Do you like this idea?

You cannot see the results of the poll until you have voted. Please login and cast your vote to see the results of this poll.
Vote Guests cannot vote

#1 GreenByteSoftware

  • Members
  • 135 posts
  • LocationKaunas, Lithuania

Posted 17 May 2014 - 04:53 PM

This is about that now anyone can go around computer's inside startup program, by creating the startup file in disk and then put to the computer what for example has password protection.
My idea is that user would be able to choose what to boot first, for example command in shell: "bootpriority computer" or "bootpriority disk", it would store it like labels are, when talking about labels if computer doesn't have label then bootpriority setting would be wiped after breaking the computer(like all the files).

Edited by thediamondgames, 24 May 2014 - 06:28 PM.


#2 Zudo

  • Members
  • 800 posts
  • LocationUK

Posted 17 May 2014 - 05:17 PM

Oh crap! I disabled CTRL-T on startup, and now I can't use my boot disk to get back into the computer, on multiplayer!

Edit: :P

Edited by ZudoHackz, 17 May 2014 - 05:17 PM.


#3 GreenByteSoftware

  • Members
  • 135 posts
  • LocationKaunas, Lithuania

Posted 17 May 2014 - 05:25 PM

View PostZudoHackz, on 17 May 2014 - 05:17 PM, said:

Oh crap! I disabled CTRL-T on startup, and now I can't use my boot disk to get back into the computer, on multiplayer!

Edit: :P
Well, by default it would still be able to boot from disk, and while in shell it would be able to change

Edited by thediamondgames, 17 May 2014 - 05:27 PM.


#4 Zudo

  • Members
  • 800 posts
  • LocationUK

Posted 17 May 2014 - 05:27 PM

View Postthediamondgames, on 17 May 2014 - 05:25 PM, said:

- snip snap -

Yes, but what if you had a program running in a loop?

#5 GreenByteSoftware

  • Members
  • 135 posts
  • LocationKaunas, Lithuania

Posted 17 May 2014 - 05:41 PM

View PostZudoHackz, on 17 May 2014 - 05:27 PM, said:

View Postthediamondgames, on 17 May 2014 - 05:25 PM, said:

- snip snap -

Yes, but what if you had a program running in a loop?
This would be your problem, you can always add password in startup file, then setup bootpriority to computer and after that you could run any program, you could be smart enough to create terminatable part if you want to boot something after startup without writing in shell and if it is your looped program you could terminate the process before entering loop program.

Edited by thediamondgames, 17 May 2014 - 05:42 PM.


#6 Sebra

  • Members
  • 726 posts

Posted 18 May 2014 - 05:44 AM

View PostZudoHackz, on 17 May 2014 - 05:17 PM, said:

Oh crap! I disabled CTRL-T on startup, and now I can't use my boot disk to get back into the computer, on multiplayer!
1.Take responsibility for your actions.
2.Do not change boot sequence if you do not want it.
3.Make yourself new computer.

#7 CometWolf

  • Members
  • 1,283 posts

Posted 18 May 2014 - 07:59 AM

This can easily be acheived by editing the rom startup file, but you'd need access to the server files to do that. I would indeed like to be able to disable this from in game.

#8 GreenByteSoftware

  • Members
  • 135 posts
  • LocationKaunas, Lithuania

Posted 18 May 2014 - 09:01 AM

View PostCometWolf, on 18 May 2014 - 07:59 AM, said:

This can easily be acheived by editing the rom startup file, but you'd need access to the server files to do that. I would indeed like to be able to disable this from in game.
Yes, but if there would be an option for an individual user who doesn't have any access to server files. It would be loaded in like labels are - from specific for example "bootpriority.dat" file.

#9 Wojbie

  • Members
  • 631 posts
  • LocationKinda lost

Posted 18 May 2014 - 11:32 AM

While i get what you are coming from i personally don't like any system that would allow end user to brick up their computers. Why you ask? While i get that if user was messing up with it and bricked it up ok his fault. But you have to take into consideration the malicious user. There are people who would brick all computers they can get to and laugh.

#10 GreenByteSoftware

  • Members
  • 135 posts
  • LocationKaunas, Lithuania

Posted 18 May 2014 - 04:10 PM

View Postwojbie, on 18 May 2014 - 11:32 AM, said:

While i get what you are coming from i personally don't like any system that would allow end user to brick up their computers. Why you ask? While i get that if user was messing up with it and bricked it up ok his fault. But you have to take into consideration the malicious user. There are people who would brick all computers they can get to and laugh.
Well, crafting a new computer need really small amount of stuff, the user should be smart enough to protect his pc in couple ways: 1st option - setup password at startup first and after that change the bootpriority, 2nd option - hide the computer, 3rd option - probably easiest if you were soooo stupid to don't put password(or don't know how to program), change bootpriority and it has some important files is to set label and put it to inventory. Anyways, protection always can brick the system, the user fault is to forget putting some software protection to protect from trols who can brick users' systems

#11 Geforce Fan

  • Members
  • 846 posts
  • LocationMissouri, United States, America, Earth, Solar System, Milky Way, Universe 42B, Life Street, Multiverse, 4th Dimension

Posted 18 May 2014 - 06:24 PM

"Dangit, someone hacked my computer, changed the startup program to a virus, then turned off the ability to boot from a floppy!"
if you remove the ability to boot from a floppy, you're going to need to add a way to access a computer's storage remotely. Like, take out the HDD

Edited by Hithere__, 18 May 2014 - 06:25 PM.


#12 Sebra

  • Members
  • 726 posts

Posted 18 May 2014 - 07:27 PM

View Postwojbie, on 18 May 2014 - 11:32 AM, said:

There are people who would brick all computers they can get to and laugh.
Now they can break instead. Is it any better?

#13 awsmazinggenius

  • Members
  • 930 posts
  • LocationCanada

Posted 18 May 2014 - 11:21 PM

shell.run("bootpriority computer")
print("You have been hacked!")
os.pullEvent = os.pullEventRaw
sleep(2^32)
os.reboot()

Edited by awsmazinggenius, 18 May 2014 - 11:22 PM.


#14 theoriginalbit

    Semi-Professional ComputerCrafter

  • Moderators
  • 7,332 posts
  • LocationAustralia

Posted 19 May 2014 - 01:31 AM

I see where you're coming from, and I definitely do not agree. If you're really concerned about it place your disk drive on the top of the computer (and hide it), its the first place the bios checks. This means your disk will take priority over any others and your startup will run, not others.

#15 Sebra

  • Members
  • 726 posts

Posted 19 May 2014 - 01:55 PM

View Postawsmazinggenius, on 18 May 2014 - 11:21 PM, said:

shell.run("bootpriority computer")
print("You have been hacked!")
os.pullEvent = os.pullEventRaw
sleep(2^32)
os.reboot()
Computer is cheap, information is important.Delete all files and computer is almost a brick.
Nothing can protect computer from malicious bomber, this suggestion ask for information protection.
No external means would protect computer from loosing info except complete isolation.

#16 CometWolf

  • Members
  • 1,283 posts

Posted 19 May 2014 - 02:58 PM

View PostSebra, on 19 May 2014 - 01:55 PM, said:

Computer is cheap, information is important.Delete all files and computer is almost a brick.
Nothing can protect computer from malicious bomber, this suggestion ask for information protection.
No external means would protect computer from loosing info except complete isolation.
Block protection would protect the computer. And i have to ask, wtf do you people keep on your cc computers that is so important?

#17 awsmazinggenius

  • Members
  • 930 posts
  • LocationCanada

Posted 19 May 2014 - 06:09 PM

For me, nothing. It all sits in my Google Drive and gets copied over automatically. Other people, well, I have no idea...

#18 GreenByteSoftware

  • Members
  • 135 posts
  • LocationKaunas, Lithuania

Posted 20 May 2014 - 10:40 AM

Wow, I didn't think that there will be similar amount of people on both sides...

#19 GreenByteSoftware

  • Members
  • 135 posts
  • LocationKaunas, Lithuania

Posted 24 May 2014 - 05:31 AM

Actually what is better?
1. Anyone can get in to your computer, read files then delete them
2. Bootpriority option which if you have a strong password program enabled at pc startup and you have a small chance to get computer bricked unless you keep it turned on.

Edited by thediamondgames, 24 May 2014 - 05:31 AM.


#20 Saldor010

  • Members
  • 467 posts
  • LocationThe United States

Posted 24 May 2014 - 12:08 PM

View Postthediamondgames, on 24 May 2014 - 05:31 AM, said:

Actually what is better?
1. Anyone can get in to your computer, read files then delete them
2. Bootpriority option which if you have a strong password program enabled at pc startup and you have a small chance to get computer bricked unless you keep it turned on.

Well, the way you phrased number 1, you're trying to make it sound like it's the worst option here, when in reality it might not be.
Let's rephrase these options so that they aren't so biased.

1. No bootpriority
2. Yes bootpriority

Now let's look at number 1 first. Number 1 is what we have right now, regular CC. The most we can really do (without encrypting all of our files), is create some sort of login system to prevent "evil doers" from getting our files. Sadly, all they have to do is just put a disk into our drive, and our computer is "hacked". Not good.

Now let's look at number 2. If CC had bootpriority, then we could just set bootpriority to our computer, then people wouldn't be able to "hack" our computers using floppys! Yay! But wait, what if somehow, your login system had a bug? A bug that allowed the evil doer to get to the shell? Or what if

View Postawsmazinggenius, on 18 May 2014 - 11:21 PM, said:

shell.run("bootpriority computer")
print("You have been hacked!")
os.pullEvent = os.pullEventRaw
sleep(2^32)
os.reboot()

Now our computer, with all of our important files, has not only lost them to the hacker, but has also bricked itself in the process. Let's just use a floppy to get the virus off of my compute... Oh...

Now if you have made sure that your login system is completely secure, good for you, but that doesn't mean everyone else has.

I believe it should be easier to compare this suggestion to old CC with these 2 scenarios.

Edited by Jiloacom, 24 May 2014 - 12:09 PM.






1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users