Security Basics mailing list archives
structuring the stolen laptop problem
From: dimkovtrajce () yahoo com
Date: 21 Jan 2008 10:08:11 -0000
Hi experts, I am doing an overview of protection of laptops. The scenario is as fallows: 1. laptop with sensitive information is stolen 2. the laptop is either hibernating or turned off when brought to the super hacker. 3. the super hacker does this for a living, and uses a structured approach to get the sensitive information from the laptops that are given to him I need to create a report that is very similar to the super hacker's in order to find possible vulnerabilities I can concentrate my research on. I would be very grateful for any input; as links, tricks, or previous work, as well as any ideas you might come up to.
Current thread:
- structuring the stolen laptop problem dimkovtrajce (Jan 21)
- Re: structuring the stolen laptop problem pentestr (Jan 22)
- Re: structuring the stolen laptop problem Iain Tubby (Jan 22)
- <Possible follow-ups>
- Re: structuring the stolen laptop problem krymson (Jan 21)
- Re: structuring the stolen laptop problem pentestr (Jan 22)