Untrue. Just use a modern Linux distribution - Fedora, Ubuntu and OpenSuse all support Secure Boot.When it is so, Linux won't boot.
Thanks for coming in to clear the air once again Matthew.
Thing is, Microsoft is managing Fast Boot via its Advance Boot Menu which allows users to 'tell' the firmware whether the next boot should be done with full firmware initialization or with just the barest minimum while letting Windows initialize the rest via the OS (which is the default behavior). Are you able to write a tool similar to the Advanced Boot Menu that allows Linux users to do this through the OS, much like what you did with shim?
When done, you can format the thumb drive again for files. Cost of the operation: 0$ for any individual with at least one thumb drive or one sd card at home. 5$ for anyone else. If you've installed linux more than two times in your life, it's cheaper (and you get a free USB drive). There are hardly any reason to use a CD actually.
That and, while it certainly depends on where you live, I know much more people that don't have empty CD/DVD-R at home than people without some kind of USB key...
Why hasn't anyone complained to the EU yet about how difficult it is to install another OS on a windows laptop?
They've heard a lot of other complaints related to microsoft and acted on them.
I'm sick of Microsoft and their clever bollocks... the need to fool people into thinking their OS isn't bloated has gotten us systems that BSOD (and sometimes windows breaks itself and still doesn't boot even if you set it back) if you so much as change the disk controller mode in the BIOS. (starting with Vista, Windows no longer probes for disk controllers at boot, once installed.) Now this.
This is what you get, when you allow a greedy, parasitic, environment polluting corporation like Microsoft to dictate hardware implementations.
I'm not sure I agree with the stance distros are taking on this. We should not work around this, the broken hardware should be absolutely shunned if this kind of crap (fastboot and secure boot) can't be disabled in the BIOS. That "secureboot" mostly protects Microsoft's interests, not ours.
Most malware won't be affected by that, it's relatively rare to have bootkits and kernel mode rootkits. I obviously see some, but for the most part it's high level trojans and adware that antivirus software doesn't even stop (maybe later it will detect it, too late), because it comes across as a legitimate software install. I see a lot of crippling, user based malware too, using available mechanisms in the user's registry (run key, runonce, shell override/appendage or even the startup directory to load) and once it's in place, it's game over for most users. No privilege elevation prompts required for this.
This horseshit is going to make it more difficult to boot with other media to remove malware, if anything.
Last edited by Grogan; 05-29-2013 at 02:35 PM.