Reza - Voipernetics wrote:
At this stage I am reaching out to the community as I have exhausted in-house, off-shore, and paid consultants who are supposedly experts in the field.
Yea, the supposed experts generally padded their resumes and this is a fairly technical area.
As for apache modules, they could still be reversed into ASM and any keys etc pulled out still.
I the attacker has physical access to the box they could also employ techniques to cool the RAM chips and then pull the data off them.
The problems comes down to cost verse benefit, the more benefit in stealing your secrets the more likely you are to be attacked.
-- Best regards, Duane http://www.freeauth.org - Enterprise Two Factor Authentication http://www.nodedb.com - Think globally, network locally http://www.sydneywireless.com - Telecommunications Freedom http://e164.org - Global Communication for the 21st Century "In the long run the pessimist may be proved right, but the optimist has a better time on the trip." --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
