> In this
> lecture, I'll explain how we could have access to the undocumented
> hibernation file. There is no need to act within 2 minutes of
> shutdown...
> READ and WRITE access to it. I'll also show how to use this file in
> defensive and also offensive cases.

I hope you'll include the details of how you accomplish this when the
hibernation file is on the encrypted portion of the disk.  That will
be the fascinating part.

Let's keep this discussion civil.  I know everyone has their own personal
agendas, but trashing other bright people's work isn't necessary.


_______________________________________________
FDE mailing list
FDE@www.xml-dev.com
http://www.xml-dev.com/mailman/listinfo/fde

Reply via email to