I just wanted to check about the way DL 1.4RC1 scans automatically at
boot to find the configuration file device scanning by DL at boot.
A table 1.1 is given at
but this may be out-of-date. Is the order of automatic scanning of
devices as shown in table 1.1 (ide cd drives first, then scsi cd drives,
then ide partitions, then scsi partitions, then scsi disks [inc USB],
and last floppy)?
I may be misunderstanding, but if one is using USB drive or floppy
(presumably write-protected) to hold one's configuration, is the system
vulnerable - in theory - to a hacker placing a 'false' config file onto
a writeable media (e.g. hard disk partition) that is scanned earlier in
the cycle, and then forcing a reboot?