Seems that your supposed safe encryption keys are held in volatile memory long enough when you shut down a pc so a hacker can grab them ::) this also means a pc coming out of hibernation is vulnerable to this, not great if you get your laptop nicked, as seems to be the trend for government departments these days, full story here (http://news.bbc.co.uk/1/hi/technology/7275407.stm) if my memory serves me right ;)
It gets harder to protect data, Gary. I think I'm just going to turn full time paranoid. :)
Quote from: Rik on Mar 05, 2008, 10:09:24
It gets harder to protect data, Gary. I think I'm just going to turn full time paranoid. :)
Turn? I thought you were already, Rik ;)
you may find this video of interest, basically shows you how to do it
http://citp.princeton.edu/memory/
:tmi: I am not going to get paranoid. ;D
Quote from: Killhippie on Mar 05, 2008, 10:15:21
Turn? I thought you were already, Rik ;)
True, OK, more paranoid... :)
more fun http://www.theregister.co.uk/2008/03/04/windows_password_bypass_tool/
Next we'll be Aralditing the firewire ports. :o
Or just boot of a Linux CD and change the password that way ;)
QuoteNext we'll be Aralditing the firewire ports
:rofl:
araldite is a scary substance! having been glued by it many times before