OK let me educate you on security and the many
ways to use the OS to your advantage.
Deny Logon Locally (Everyone) But add owner.
Log on Locally (Remove Everyone) But add owner.
Restore Files and Directories (Remove Everyone) But add owner.
Take Ownership of files of other objects (Remove Everyone) But add owner.
Recovery Console Allow Automatic Administrative Login (Disabled)
Recovery Console Allow copy and access to all drive and all folders (Disabled)
Restrict CD-ROM access to locally logged on user only (Enabled)
Restrict Floppy Drive Access to locally logged on user only (Enabled)
Shut down system immediately if unable to log security audits (Enabled)
Audit logon events (Success and Failure)
Audit object access (Success and Failure)
Audit privilege user (Success and Failure)
Encrypted Data Recovery Agent (Remove Administrator)
Group Policy Domain Controller Selection (Disabled)
Disjoin computer from Domain to prevent other policies
from overriding the local policies.
Set the Bios password and put in the security screws in back of case. In Bios make sure it is only allowed to boot from the Hard disk. Change the password the administrator gave you to logon to the network. Install Triple DES Encryption software to meet these standards
Wow seems like that Linux boot disk won't work in the computer now. I guess to answer you question no it is NOT secure because ekÆsine would just steal the whole computer pull the hard drive and try to break the Triple DES encryption on the files.
And for the next lesson we will discuss LETS STICK TO THE TOPIC!