On Sep 9, 2007, at 12:32, Michael Jardine wrote:

>       Zac,
>
>       A BIOS-based password can be cracked within minutes using  
> brute force
> software you can download from the internet. This is partly related  
> to the
> way the password is stored and used in BIOS.

Hmm, I'm a bit confused by this reply, additional information would  
be appreciated.  I thought the whole idea behind FDE encryption was  
the password was stored on the hard drive, not the bios.  I think  
just about everyone will agree that bios passwords offer limited  
protection, as the hard drive can simply be migrated to another  
computer and booted there.  Then again, my whole understanding of FDE  
could be wrong (won't be the first time :).

Thanks!

lance


>    -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
> dev.com] On
> Behalf Of Zac Folini
> Sent: Saturday, September 08, 2007 8:21 PM
> To: [email protected]
> Subject: Re: [FDE] Seagate FDE available from retailer
>
>    Michael,
>
>    I am planning to purchase the drive. Can you please elaborate on  
> what you
> mean by software to authenticate? How will this authentication  
> software
> provide more security compared to the native ATA Drive Lock? I am  
> planning
> to use it for personal use, so I don't need central management etc.
>
>    Thanks
>    Zac
_______________________________________________
FDE mailing list
[email protected]
http://www.xml-dev.com/mailman/listinfo/fde

Reply via email to