/build/static/layout/Breadcrumb_cap_w.png

What About Security?

What PXE security technologies exist?


0 Comments   [ + ] Show comments

Answers (1)

Posted by: bkelly 20 years ago
Red Belt
2
Boot Integrity Services (BIS) was defined to address the potential vulnerability exposed by validating the image. Using BIS, firmware built into the client PC can validate, before executing a boot image, that the image came from a trusted source and was not tampered with en route. BIS employs a digital signature and public-key cryptography to ensure that systems booting from the network use only approved boot images.

Comments:
  • unanswered for 11 years.

    poor bkelly :( - Wildwolfay 8 years ago
    • lol, this was part of an FAQ about PXE migrated from AppDeploy. The Q&A area seemed most appropriate but out of context, it's a bit hard to decipher this one ;)

      All the stuff tagged with appdeploy-faqs are part of what were various FAQs - http://www.itninja.com/tag/appdeploy-faqs - bkelly 8 years ago
Rating comments in this legacy AppDeploy message board thread won't reorder them,
so that the conversation will remain readable.

Don't be a Stranger!

Sign up today to participate, stay informed, earn points and establish a reputation for yourself!

Sign up! or login

View more:

Share

 
This website uses cookies. By continuing to use this site and/or clicking the "Accept" button you are providing consent Quest Software and its affiliates do NOT sell the Personal Data you provide to us either when you register on our websites or when you do business with us. For more information about our Privacy Policy and our data protection efforts, please visit GDPR-HQ