Hi Another issue is so called "cold boot atack" http://www.engadget.com/2008/02/21/cold-boot-disk-encryption-attack-is-shockingly-effective/ http://www.youtube.com/watch?v=Y_70UC0tPUU It can be used even against encrypted disks.
Best regards, ILYA On Wed, May 6, 2009 at 8:44 PM, Ralph Pichie <[email protected]> wrote: > "Researchers have extracted information from nothing more than the > reflection of a computer monitor off an eyeball or the sounds > emanating from a printer." > > http://www.scientificamerican.com/article.cfm?id=hackers-can-steal-from-reflections > It's in the print version, May 2009 issue as well. > > Not something that I would worry about in most circumstances, but food > for thought (and probably some paranoia). Ok, I have to go. There are > two guys in black at my door... > > _______________________________________________ > clug-talk mailing list > [email protected] > http://clug.ca/mailman/listinfo/clug-talk_clug.ca > Mailing List Guidelines (http://clug.ca/ml_guidelines.php) > **Please remove these lines when replying > _______________________________________________ clug-talk mailing list [email protected] http://clug.ca/mailman/listinfo/clug-talk_clug.ca Mailing List Guidelines (http://clug.ca/ml_guidelines.php) **Please remove these lines when replying

