Yeah that too...
Z
Edward E. Ziots, CISSP, Security +, Network +
Security Engineer
Lifespan Organization
ezi...@lifespan.org
-Original Message-
From: David Lum [mailto:david@nwea.org]
Sent: Friday, December 21, 2012 4:01 PM
To: NT System Admin Issues
Subject: RE: Disk encryption
o: NT System Admin Issues
Subject: Re: Disk encryption killer: Anyone see this?
Good point.
(Although I bet stealing the laptop would be prone to being uncovered, too.
;-)
(Yes, I get that it's before vs after the data theft. :) ) )
On Sun, Dec 23, 2012 at 7:03 AM, Ken Schaefer wrote
Good point.
(Although I bet stealing the laptop would be prone to being
uncovered, too. ;-)
(Yes, I get that it's before vs after the data theft. :) ) )
On Sun, Dec 23, 2012 at 7:03 AM, Ken Schaefer wrote:
> Do you mean, snag the clear-text version of the user's files? If the user has
em Admin Issues
Subject: Re: Disk encryption killer: Anyone see this?
On Fri, Dec 21, 2012 at 7:20 PM, Ken Schaefer wrote:
> Another option would be to trick the user into installing this
> software, or trick the user into somehow giving away access to the
> machine (aka these APTs we
On Fri, Dec 21, 2012 at 7:20 PM, Ken Schaefer wrote:
> Another option would be to trick the user into installing
> this software, or trick the user into somehow giving away
> access to the machine (aka these APTs we keep hearing about)
> and layering this on top.
But if you can do that, why bot
: David Lum [mailto:david@nwea.org]
Sent: Saturday, 22 December 2012 7:39 AM
To: NT System Admin Issues
Subject: RE: Disk encryption killer: Anyone see this?
So I'm hearing we shouldn't be concerned about a PGP-encrypted laptop *unless*
it's hibernation file is unencrypted (rea
ord then?
>
> -Original Message-
> From: Ziots, Edward [mailto:ezi...@lifespan.org]
> Sent: Friday, December 21, 2012 12:59 PM
> To: NT System Admin Issues
> Subject: RE: Disk encryption killer: Anyone see this?
>
> Its not hard to get a memory dump from a PC that i
Simple to get past the screensaver password then?
-Original Message-
From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Friday, December 21, 2012 12:59 PM
To: NT System Admin Issues
Subject: RE: Disk encryption killer: Anyone see this?
Its not hard to get a memory dump from a PC
Message-
From: David Lum [mailto:david@nwea.org]
Sent: Friday, December 21, 2012 3:39 PM
To: NT System Admin Issues
Subject: RE: Disk encryption killer: Anyone see this?
So I'm hearing we shouldn't be concerned about a PGP-encrypted laptop
*unless* it's hibernation file is un
if a
target PC is turned off"
>> If the hiberfil.sys is encrypted, how do they get to it?
Dave
-Original Message-
From: Steve Kradel [mailto:skra...@zetetic.net]
Sent: Friday, December 21, 2012 10:59 AM
To: NT System Admin Issues
Subject: Re: Disk encryption killer: Anyone see this?
I
Sensationalist tech press is sensational?
On Fri, Dec 21, 2012 at 2:47 PM, Ben Scott wrote:
> On Fri, Dec 21, 2012 at 2:38 PM, Andrew S. Baker
> wrote:
> > You could unlock my safe if I gave you the keys as well, which is all
> that is happening here.
> > Even the bit about using the hibernati
On Fri, Dec 21, 2012 at 2:38 PM, Andrew S. Baker wrote:
> You could unlock my safe if I gave you the keys as well, which is all that is
> happening here.
> Even the bit about using the hibernation file is not worthy of the headline
> they provided...
> It's not like they're *cracking* the encypt
time and effort the encryption will
>> >> be cracked and data will be obtained.
>> >>
>> >>
>> >>
>> >> Z
>> >>
>> >>
>> >>
>> >> Edward E. Ziots, CISSP, Security +, Network +
>> &
t; From: Ziots, Edward
> > [mailto:ezi...@lifespan.org]
> > To: NT System Admin Issues
> > [mailto:ntsysadmin@lyris.sunbelt-software.com]
> > Sent: Fri, 21 Dec 2012
> > 09:57:51 -0800
> > Subject: RE: Disk encryption killer: Anyone see this?
> >
> >
> >
rd
> [mailto:ezi...@lifespan.org]
> To: NT System Admin Issues
> [mailto:ntsysadmin@lyris.sunbelt-software.com]
> Sent: Fri, 21 Dec 2012
> 09:57:51 -0800
> Subject: RE: Disk encryption killer: Anyone see this?
>
>
>> I would say off the record no, if you used popular encry
o:ezi...@lifespan.org]
To: NT System Admin Issues
[mailto:ntsysadmin@lyris.sunbelt-software.com]
Sent: Fri, 21 Dec 2012
09:57:51 -0800
Subject: RE: Disk encryption killer: Anyone see this?
> I would say off the record no, if you used popular encryption software
> and a repeatable process, but wh
ineer
>
> Lifespan Organization
>
> ezi...@lifespan.org
>
> ** **
>
> *From:* Chinnery, Paul [mailto:pa...@mmcwm.com]
> *Sent:* Friday, December 21, 2012 12:37 PM
>
> *To:* NT System Admin Issues
> *Subject:* RE: Disk encryption killer: Anyone see this?
>
>
+, Network +
Security Engineer
Lifespan Organization
ezi...@lifespan.org
From: Chinnery, Paul [mailto:pa...@mmcwm.com]
Sent: Friday, December 21, 2012 12:37 PM
To: NT System Admin Issues
Subject: RE: Disk encryption killer: Anyone see this?
Oh, great. I wonder what view CMS will take if a
Yes and Pgpcrack also is another tool to crack PGP encryption.
Z
Edward E. Ziots, CISSP, Security +, Network +
Security Engineer
Lifespan Organization
ezi...@lifespan.org
From: David Lum [mailto:david@nwea.org]
Sent: Friday, December 21, 2012 12:29 PM
To: NT System Admin
Oh, great. I wonder what view CMS will take if a laptop is stolen\lost and
it's encrypted. Will they still say it's a HIPAA violation?
From: David Lum [mailto:david@nwea.org]
Sent: Friday, December 21, 2012 12:29 PM
To: NT System Admin Issues
Subject: Disk encryption killer: Anyone see this
, I'll give the
product a 92 out of 100...
Dave
From: Lists - Level 5 [mailto:li...@levelfive.us]
Sent: Thursday, October 07, 2010 7:44 PM
To: NT System Admin Issues
Subject: RE: disk encryption
Thanks guys, we considered moving to citrix but there are just too many
applications to make it fea
upgrade everyone just to get the same benefits of
true crypt.
From: John Cook [mailto:john.c...@pfsf.org]
Sent: Thursday, October 07, 2010 11:44 AM
To: NT System Admin Issues
Subject: RE: disk encryption
We're evaluating Checkpoint as a whole disk encryption solution. We have a
pr
have also used McAfee
endpoint but don't get me started on that rant..
From: Steven M. Caesare [mailto:scaes...@caesare.com]
Sent: Thursday, October 07, 2010 11:27 AM
To: NT System Admin Issues
Subject: RE: disk encryption
We have an existing PointSec implementation, and are moving tow
on, and are moving towards PGP
> and/or Bitlocker.
>
>
>
> -sc
>
>
>
> *From:* greg.swe...@actsconsulting.net [mailto:
> greg.swe...@actsconsulting.net]
> *Sent:* Thursday, October 07, 2010 1:40 AM
>
> *To:* NT System Admin Issues
> *Subject:* RE: disk encrypti
We have an existing PointSec implementation, and are moving towards PGP
and/or Bitlocker.
-sc
From: greg.swe...@actsconsulting.net
[mailto:greg.swe...@actsconsulting.net]
Sent: Thursday, October 07, 2010 1:40 AM
To: NT System Admin Issues
Subject: RE: disk encryption
Ben,
We have
From: Lists - Level 5 [mailto:li...@levelfive.us]
Sent: Thursday, October 07, 2010 12:38 AM
To: NT System Admin Issues
Subject: RE: disk encryption
Well that's what we are considering, the issue is they do have several graphics
and presentation people, they also have a bunch of little 'apps
its 5 years old from the last time they purchased anything.
From: Jon Harris [mailto:jk.har...@gmail.com]
Sent: Wednesday, October 06, 2010 11:39 PM
To: NT System Admin Issues
Subject: Re: disk encryption
Why not just put everything on Citrix and have done with it? Not
criticizing just a
Why not just put everything on Citrix and have done with it? Not
criticizing just asking? I would avoid encrypting the servers and lock them
down tight and lock them up tighter.
Jon
On Wed, Oct 6, 2010 at 10:46 PM, Lists - Level 5 wrote:
> I have a small client, 15 laptops, 20 desktops , 8 s
28 matches
Mail list logo