Abuse Melding

Je hebt een klacht over de onderstaande posting:

05-02-2007, 13:52 door Anoniem

Ondanks de dramatische titel blijkt het wel mee te vallen als ik het artikel lees. That means law enforcement officers need to get into the habit of seizing USB keys as well as PCs in the course of conducting a raid. Brian Karney, director of product marketing at Guidance Software, said the computer forensics firm had worked with Microsoft on BitLocker and that it knew of "no backdoors". Getting to machines while they are still turned on and taking a forensically sound copy is an option even in the absence of USB Keys, Karney explained. "Even though the logical volume is encrypted the OS works on top of an abstraction layer. We can see what the OS sees so that it's possible to acquire data on a running Vista machine even when it is running BitLocker." In cases when a consumer machine running Vista happens to be turned off at the point its seized, a password is needed. However, in corporate environments a BitLocker recovery key can be used to allow examination of target ...

Beschrijf je klacht (Optioneel):

captcha