How Does Linux Boot? Part 3: UEFI to Shim to the Next Link in the Chain

Two weeks ago I started explaining how Linux boots.  Last week I got as far as the UEFI firmware finding a running a “shim” program named shim.efi to satisfy the Secure Boot security policy with its digital signature from a trusted signing authority (which, to further discourage the conspiracy theories, is not Microsoft or somehow […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.