killer: Anyone see this?
Simple to get past the screensaver password then?
-Original Message-
From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Friday, December 21, 2012 12:59 PM
To: NT System Admin Issues
Subject: RE: Disk encryption killer: Anyone see this?
Its not hard to get a
o: NT System Admin Issues
Subject: Re: Disk encryption killer: Anyone see this?
Good point.
(Although I bet stealing the laptop would be prone to being uncovered, too.
;-)
(Yes, I get that it's before vs after the data theft. :) ) )
On Sun, Dec 23, 2012 at 7:03 AM, Ken Schaefer wrote
Good point.
(Although I bet stealing the laptop would be prone to being
uncovered, too. ;-)
(Yes, I get that it's before vs after the data theft. :) ) )
On Sun, Dec 23, 2012 at 7:03 AM, Ken Schaefer wrote:
> Do you mean, snag the clear-text version of the user's files? If the user has
em Admin Issues
Subject: Re: Disk encryption killer: Anyone see this?
On Fri, Dec 21, 2012 at 7:20 PM, Ken Schaefer wrote:
> Another option would be to trick the user into installing this
> software, or trick the user into somehow giving away access to the
> machine (aka these APTs we
On Fri, Dec 21, 2012 at 7:20 PM, Ken Schaefer wrote:
> Another option would be to trick the user into installing
> this software, or trick the user into somehow giving away
> access to the machine (aka these APTs we keep hearing about)
> and layering this on top.
But if you can do that, why bot
: David Lum [mailto:david@nwea.org]
Sent: Saturday, 22 December 2012 7:39 AM
To: NT System Admin Issues
Subject: RE: Disk encryption killer: Anyone see this?
So I'm hearing we shouldn't be concerned about a PGP-encrypted laptop *unless*
it's hibernation file is unencrypted (rea
ord then?
>
> -Original Message-
> From: Ziots, Edward [mailto:ezi...@lifespan.org]
> Sent: Friday, December 21, 2012 12:59 PM
> To: NT System Admin Issues
> Subject: RE: Disk encryption killer: Anyone see this?
>
> Its not hard to get a memory dump from a PC that i
Simple to get past the screensaver password then?
-Original Message-
From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Friday, December 21, 2012 12:59 PM
To: NT System Admin Issues
Subject: RE: Disk encryption killer: Anyone see this?
Its not hard to get a memory dump from a PC
Message-
From: David Lum [mailto:david@nwea.org]
Sent: Friday, December 21, 2012 3:39 PM
To: NT System Admin Issues
Subject: RE: Disk encryption killer: Anyone see this?
So I'm hearing we shouldn't be concerned about a PGP-encrypted laptop
*unless* it's hibernation file is un
if a
target PC is turned off"
>> If the hiberfil.sys is encrypted, how do they get to it?
Dave
-Original Message-
From: Steve Kradel [mailto:skra...@zetetic.net]
Sent: Friday, December 21, 2012 10:59 AM
To: NT System Admin Issues
Subject: Re: Disk encryption killer: Anyone see this?
I
Sensationalist tech press is sensational?
On Fri, Dec 21, 2012 at 2:47 PM, Ben Scott wrote:
> On Fri, Dec 21, 2012 at 2:38 PM, Andrew S. Baker
> wrote:
> > You could unlock my safe if I gave you the keys as well, which is all
> that is happening here.
> > Even the bit about using the hibernati
On Fri, Dec 21, 2012 at 2:38 PM, Andrew S. Baker wrote:
> You could unlock my safe if I gave you the keys as well, which is all that is
> happening here.
> Even the bit about using the hibernation file is not worthy of the headline
> they provided...
> It's not like they're *cracking* the encypt
time and effort the encryption will
>> >> be cracked and data will be obtained.
>> >>
>> >>
>> >>
>> >> Z
>> >>
>> >>
>> >>
>> >> Edward E. Ziots, CISSP, Security +, Network +
>> &
t; From: Ziots, Edward
> > [mailto:ezi...@lifespan.org]
> > To: NT System Admin Issues
> > [mailto:ntsysadmin@lyris.sunbelt-software.com]
> > Sent: Fri, 21 Dec 2012
> > 09:57:51 -0800
> > Subject: RE: Disk encryption killer: Anyone see this?
> >
> >
> >
rd
> [mailto:ezi...@lifespan.org]
> To: NT System Admin Issues
> [mailto:ntsysadmin@lyris.sunbelt-software.com]
> Sent: Fri, 21 Dec 2012
> 09:57:51 -0800
> Subject: RE: Disk encryption killer: Anyone see this?
>
>
>> I would say off the record no, if you used popular encry
o:ezi...@lifespan.org]
To: NT System Admin Issues
[mailto:ntsysadmin@lyris.sunbelt-software.com]
Sent: Fri, 21 Dec 2012
09:57:51 -0800
Subject: RE: Disk encryption killer: Anyone see this?
> I would say off the record no, if you used popular encryption software
> and a repeatable process, but wh
ineer
>
> Lifespan Organization
>
> ezi...@lifespan.org
>
> ** **
>
> *From:* Chinnery, Paul [mailto:pa...@mmcwm.com]
> *Sent:* Friday, December 21, 2012 12:37 PM
>
> *To:* NT System Admin Issues
> *Subject:* RE: Disk encryption killer: Anyone see this?
>
>
+, Network +
Security Engineer
Lifespan Organization
ezi...@lifespan.org
From: Chinnery, Paul [mailto:pa...@mmcwm.com]
Sent: Friday, December 21, 2012 12:37 PM
To: NT System Admin Issues
Subject: RE: Disk encryption killer: Anyone see this?
Oh, great. I wonder what view CMS will take if a
Yes and Pgpcrack also is another tool to crack PGP encryption.
Z
Edward E. Ziots, CISSP, Security +, Network +
Security Engineer
Lifespan Organization
ezi...@lifespan.org
From: David Lum [mailto:david@nwea.org]
Sent: Friday, December 21, 2012 12:29 PM
To: NT System Admin
Oh, great. I wonder what view CMS will take if a laptop is stolen\lost and
it's encrypted. Will they still say it's a HIPAA violation?
From: David Lum [mailto:david@nwea.org]
Sent: Friday, December 21, 2012 12:29 PM
To: NT System Admin Issues
Subject: Disk encryption killer: Anyone see this
20 matches
Mail list logo