On Sep 9, 2007, at 12:32, Michael Jardine wrote: > Zac, > > A BIOS-based password can be cracked within minutes using > brute force > software you can download from the internet. This is partly related > to the > way the password is stored and used in BIOS.
Hmm, I'm a bit confused by this reply, additional information would be appreciated. I thought the whole idea behind FDE encryption was the password was stored on the hard drive, not the bios. I think just about everyone will agree that bios passwords offer limited protection, as the hard drive can simply be migrated to another computer and booted there. Then again, my whole understanding of FDE could be wrong (won't be the first time :). Thanks! lance > -----Original Message----- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] > dev.com] On > Behalf Of Zac Folini > Sent: Saturday, September 08, 2007 8:21 PM > To: [email protected] > Subject: Re: [FDE] Seagate FDE available from retailer > > Michael, > > I am planning to purchase the drive. Can you please elaborate on > what you > mean by software to authenticate? How will this authentication > software > provide more security compared to the native ATA Drive Lock? I am > planning > to use it for personal use, so I don't need central management etc. > > Thanks > Zac _______________________________________________ FDE mailing list [email protected] http://www.xml-dev.com/mailman/listinfo/fde
