Soldato
if they're 8 you throw the laptop in the seahow does age change the technical answer.
if they're 18 you throw them in the sea
Last edited:
if they're 8 you throw the laptop in the seahow does age change the technical answer.
A 6 year old probably isn't going to have access to some of the technical tools that an adult with physical access to the device would have.
No amount of security is going to prevent someone with enough time, resources, and physical access to a device from gaining entry.
One thing that makes no sense, why not just take the laptop?
We don't have enough information to help you, you don't have enough information to help you. They can't bypass security if they don't have the laptop.
I wouldn't say it's a "mind fart" as it's highly relevant as you've shown, like i said no amount of security is going to prevent someone with physical access to a device from, well, accessing it.
The only thing that changes that is someone's age, the liklyhood that someone will have access to what's needed increases as they get older. E.g if you locked the laptop in a hardened steel box i could just buy an angle grinder whereas a 6 year old probably couldn't.
Wow, thanks. Way to miss the point and throw an insult at someone trying to help.You're thinking like a cave man. Brute force.
Like i said you're missing the point, that was an example of no matter how extreme you go with security nothing is going to stop someone with physical access to the device from accessing it and the data on it.They don't need to use an angle grinder they can just find a way past the lock. If you have physical access to the box and lock (and key) so will they. They just have to find it. There's' a finite number of hiding places for things, before the solutions is more work than the problem you're trying to solve.
Wow, thanks. Way to miss the point and throw an insult at someone trying to help.
Like i said you're missing the point, that was an example of no matter how extreme you go with security nothing is going to stop someone with physical access to the device from accessing it and the data on it.
playing devils advocate here for a second... Are you looking for every password bypass method or actual solid sound advice to shut the behaviour down? One will keep the conversation going forever the other only you have the power to do.
I just wondered how it was done. That was the question asked.
As for behavior https://en.wikipedia.org/wiki/The_Scorpion_and_the_Frog
Yea, no. You asked this...Hard to take steel box and angle grinders seriously. Considering it wouldn't work either. Since I have tools and even bolt cutters that could go through most locks.
Also you're answering a question I didn't ask.
And people have been telling you that the how is irrelevant because anyone with physical access to the device could use a million and one ways to bypass the laptops password, that it's not a security issue because all security does is delay unauthorised access attempts until you take more permanent measures.Ok one of the Kids is bypassing the the laptop (w11) password.
Two accounts on the laptop mine and theirs. Both with random passwords that can't be guessed. Kid still Managed to get on it.
Now I'm wondering has he a keylogger on it. Nothing in the USB ports. Could he have something on it that exists before Windows Loads.
I'm going to wipe the machine and put linux on it. Leave him with no account on it. But I'm curious how he's getting on it.
Yea, no. You asked this...
And people have been telling you that the how is irrelevant because anyone with physical access to the device could use a million and one ways to bypass the laptops password, that it's not a security issue because all security does is delay unauthorised access attempts until you take more permanent measures.
If that's not the question you asked maybe you'd like be a little more specific.
Also, thanks for the apology for saying i was "thinking like a cave man".
Captain caveman rocked and you know it. Secretly you loved that.
Yea, no. You asked this...
And people have been telling you that the how is irrelevant because anyone with physical access to the device could use a million and one ways to bypass the laptops password, that it's not a security issue because all security does is delay unauthorised access attempts until you take more permanent measures.
If that's not the question you asked maybe you'd like be a little more specific.
Also, thanks for the apology for saying i was "thinking like a cave man".
Yea, no. You asked this...
And people have been telling you that the how is irrelevant because anyone with physical access to the device could use a million and one ways to bypass the laptops password, that it's not a security issue because all security does is delay unauthorised access attempts until you take more permanent measures.
If that's not the question you asked maybe you'd like be a little more specific.
Also, thanks for the apology for saying i was "thinking like a cave man".
I didn't mention anything about that, I was trying to keep it strictly PC. I said my bit a page back - Anyway just shut it down, doesn't matter how you do it with tech or whatever... what you don't want though is the little blighter growing up thinking he can outsmart you every step of the way (even though he probably can)... It doesn't matter how you do it, you have to put a stop to that early doors my man!
Im trying to work out how that fable is appropriate in this context? Are overlockers the scorpions, is your son the scorpion and you are the ever suffering frog? doesn't matter I guess, just interesting seeing how peoples mind work.
Hard to change someone habits if its their nature. Since "shut the behaviour down" I assume was referring to that.
In none of that did I asked how stop him getting access. Though someone helpfully pointed out you can bypass in Linux also.
Then that raises the question of why you're curious, I'm not saying it's wrong to be curious but as has been said the how of it can be a million and one ways, none of which you'll be able to discern with any degree of confidence."But I'm curious how he's getting on it." seems fairly specific.
I guess I should have said he doesn't need to brute force it.