Rich Freeman wrote: > If you're worried about casual thieves then just about any kind of > properly-implemented encryption will stop them. > > If you're worried about a government official specifically tasked with > retrieving your computer, my understanding is that it is SOP these > days to retrieve your computer without powering it off for just this > reason. They won't use your UPS to do it. Typically they remove the > plug just far enough to expose the prongs, slide in a connector that > connects it to a UPS, and then they pull it out the rest of the way > now powered by the UPS. > > See something like: > http://www.cru-inc.com/products/wiebetech/hotplug_field_kit/ > > Presumably somebody who is determined will also have the means to > retrieve the contents of RAM once they seize your computer. Besides > directlly accessing the memory bus I think most motherboards are not > designed to be secure against attacks from PCI/firewire/etc. > > Rich > >
Now that is wicked. Like I said, this could get crazy. ROFL Thing is, with Linux, it could be set up to run a script so that if say the keyboard/mouse/some other device is removed, it runs shutdown. It seems the biggest thing as for as Govt goes, having it do something they can't anticipate it doing that locks things down or does a rm -rfv /* or some other nasty command. I might add, on a older rig I tried that command once. I ran rm -rfv /* and it didn't erase everything like I thought it would. I figured the command would be loaded in ram and would run until the end of the / structure. It didn't. I can't recall how far it got now but I think it was in the /proc directory. I figure it deleted the process and sort of forgot to finish. It's been a while since I did that tho. Details are fuzzy. Dale :-) :-) -- I am only responsible for what I said ... Not for what you understood or how you interpreted my words!