Insert ubuntu live cd

>insert ubuntu live cd
>mount /dev/sda1 /mnt
>chroot /mnt /bin/bash
>passwd
LiNuX iS sEcUrE

Anything not encrypted is up for grabs when offline or perhaps online for that matter...

If you have R access to any /dev/* portion of the system, it's insecure.
Encrypt it you cheapskate.

normies dont even use any kind of encryption

The fuck are you talking about. If you have physical access to someone's computer, you have the keys to everything. It's been that way since forever.

Short of encrypting the whole hard drive (and keeping the PC turned off so no one gets the keys from memory), no piece of software is gonna save you from someone who has physical access.

Now get the fuck out.

should I put tin foil on top of my thinkpad?

you can do the same with windows too
fantastic thread by the way

...

physical access gets you absolutely anything when there isn't encryption. you can mount a windows partition too from a linux live cd and browse all the files without typing a single password.

Good thing my disk is encrypted and this laptop is a real bitch to open.

It may distract them just long enough to forget what they had stolen your thinkpad for.

It's ubuntu. Just boot to recovery mode and change the password.

>insert live cd
>mount Windows' C: partition
>go through your scat porn

>insert ubuntu live cd
>mount Windows partition
>copy cmd and rename it magnify.exe
>reboot
>open easy of access on login screen
>magnifier
>net user administrator /enabled:yes
>net user administrator *

WiNdOwS iS sEcUrE


>reboot
>command R
>recovery Terminal
>'resetpassword'

OsX iS sEcUrE

Any OS unless encrypted is secure you fucking idiotic nigger monkey, fuck off back to plebbit

>Anonymo̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥us


omg i am le zalgo spooky man


Anonymo̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥̥us

dude wtf is this o character

ntpasswd has done this for windows systems for like 20 years

you can use chntpw to change windows passwords directly in linux

nothing unencrypted is 'secure' from offline attacks of any kind, this isn't unique to any os

>Installs Linux
>Doesn't encrypt the whole system
Why the fuck are stupid normalfags coming to Linux?

>cryptsetup
>teleports an error into the stderr of your mount command
>nothin personnel kidd

I did not know that part, but I know nothing is secure, I was proving a point.

Or mount a windows partition and remove its password. There's a couple of tools for that. Hell, or just copy all the data off it and don't even bother with logging in.

As others have noted, unless it's encrypted, it's up for grabs offline.

This.

You can do the same with any OS as long as the partition isn't encrypted.
I did it dozens of times when dealing with windows restores for me and classmates back in school, just plug the HDD/SSD in another machine as secondary HDD and there you go.

>local exploit
you sure got me

This.
And these.
All of these.
And almost everything in this thread so far.
And a little common sense couldn't hurt either