Larry, there is no disk involved on the problem, only memory. So if the disk is encrypted or not, doesn't matter.
Regards, Jardel Weyrich On Sun, Mar 9, 2008 at 11:14 PM, Larry Seltzer <[EMAIL PROTECTED]> wrote: > >>WRT the DMA access over FireWire it's but a bad response since it > doesn't get the point! > >>1. Drive encryption won't help against reading the memory. > >>2. The typical user authentication won't help, we're at hardware level > >> here, and no OS needs to be involved. > >>3. The computer is up (and running; see above), no hibernate or sleep > >> is involved here. > > So on a freshly-booted system with drive encryption you can read > whatever you want on the disk? > > >>4. Group policies can be circumvented, even by a limited user. > >> > <http://blogs.technet.com/markrussinovich/archive/2005/12/12/circumventi > ng-group-policy-as-a-limited-user.aspx<http://blogs.technet.com/markrussinovich/archive/2005/12/12/circumventing-group-policy-as-a-limited-user.aspx> > > > > What he says is that some group policies, not including system-wide > security settings, maybe circumvented, even by a limited user. > > Larry Seltzer > eWEEK.com Security Center Editor > http://security.eweek.com/ > http://blogs.pcmag.com/securitywatch/ > Contributing Editor, PC Magazine > [EMAIL PROTECTED] > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ >
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
