Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]


Groups > comp.lang.java.security > #68

Re: Cracking popular secu

From "Tomislav Petrovic" <tomislav.petrovic@THRWHITE.remove-dii-this>
Subject Re: Cracking popular secu
Message-ID <eaka95xha8.ln2@news.envox-lab.hr> (permalink)
Newsgroups comp.lang.java.security
References <4uuur3lbcdaitgu0bbu75n8brfo2k2fru2@4ax.com>
Date 2011-04-27 16:07 +0000
Organization TDS.net

Show all headers | View raw


  To: comp.lang.java.security
Roedy Green said on 23.2.2008 2:51:
> file://localhost/F:/program%20files/eudora/attach/Research%20Team%20Finds%20Security%20Flaw%20in%20Popular%20Disk%20Encryption%20Technologies%20%20Electronic%20Frontier%20Foundation.htm
> 
> Researchers have cracked Microsoft and Apple file encryption is the
> usual way, by sneaking around the locks rather than breaking them.
> 
> They discovered you could scavenge RAM after a short power off.

OK, now we know you have Windows with F partition, eudora,.... :)
This link should be more helpfull :) http://citp.princeton.edu/memory/

-- 
Tomy

---
 * Synchronet * The Whitehouse BBS --- whitehouse.hulds.com --- check it out free usenet!
--- Synchronet 3.15a-Win32 NewsLink 1.92
Time Warp of the Future BBS - telnet://time.synchro.net:24

Back to comp.lang.java.security | Previous | NextPrevious in thread | Find similar


Thread

Cracking popular security "Roedy Green" <roedy.green@THRWHITE.remove-dii-this> - 2011-04-27 16:07 +0000
  Re: Cracking popular secu "Tomislav Petrovic" <tomislav.petrovic@THRWHITE.remove-dii-this> - 2011-04-27 16:07 +0000

csiph-web