On Fri, Dec 21, 2012 at 7:20 PM, Ken Schaefer <[email protected]> wrote: > Another option would be to trick the user into installing > this software, or trick the user into somehow giving away > access to the machine (aka these APTs we keep hearing about) > and layering this on top.
But if you can do that, why bother with trying to attack the encryption? Just wait for the user to use it, and snag the cleartext version. :) -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
