Security Basics mailing list archives

structuring the stolen laptop problem


From: dimkovtrajce () yahoo com
Date: 21 Jan 2008 10:08:11 -0000

Hi experts,

I am doing an overview of protection of laptops.
The scenario is as fallows:
1. laptop with sensitive information is stolen
2. the laptop is either hibernating or turned off when brought to the super hacker.
3. the super hacker does this for a living, and uses a structured approach to get the sensitive information from the 
laptops that are given to him

I need to create a report that is very similar to the super hacker's in order to find possible vulnerabilities I can 
concentrate my research on.

I would be very grateful for any input; as links, tricks, or previous work, as well as any ideas you might come up to.


Current thread: