> In this > lecture, I'll explain how we could have access to the undocumented > hibernation file. There is no need to act within 2 minutes of > shutdown... > READ and WRITE access to it. I'll also show how to use this file in > defensive and also offensive cases.
I hope you'll include the details of how you accomplish this when the hibernation file is on the encrypted portion of the disk. That will be the fascinating part. Let's keep this discussion civil. I know everyone has their own personal agendas, but trashing other bright people's work isn't necessary. _______________________________________________ FDE mailing list FDE@www.xml-dev.com http://www.xml-dev.com/mailman/listinfo/fde