On Tue, Aug 12, 2008 at 07:42:05AM -0700, Karl Cunningham wrote:
If it only takes a minute to crack the password it can't be that strong, or maybe it knows the master master password and it sleeps for a minute so you think it's actually doing something.
At least year's Linux World, I attended a talk by a guy who runs a data recovery service. He says he generally recovers password protected HDs by swapping the controller board out with a special one, but it tends to depend a lot on the drive and how it is implemented. A minute isn't really long enough to do any meaningful password cracking, but if it works, and you can't find out what it is doing, it might be the easiest way to do it. I had a laptop with a locked drive. It was fine because the fingerprint reader would give the password out on reboot, so I didn't have to remember it. Later, I tried moving the drive to an enclosure to read, and ended up having to put it back into the laptop to be able to remove the password off of it. David -- [email protected] http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list
