F5F Stay Refreshed Software Operating Systems Windows 10 is quite accessible for unauthorized access.

Windows 10 is quite accessible for unauthorized access.

Windows 10 is quite accessible for unauthorized access.

Pages (3): Previous 1 2 3 Next
P
Pokelover927
Junior Member
4
07-04-2016, 08:39 PM
#11
I’m frequently asked about restoring encrypted information from devices by individuals with limited technical knowledge.
P
Pokelover927
07-04-2016, 08:39 PM #11

I’m frequently asked about restoring encrypted information from devices by individuals with limited technical knowledge.

A
allikat4
Junior Member
24
07-06-2016, 12:16 AM
#12
When someone has sufficient funds, they can purchase a drill to access the PC and hire a specialist to decrypt the storage device.
A
allikat4
07-06-2016, 12:16 AM #12

When someone has sufficient funds, they can purchase a drill to access the PC and hire a specialist to decrypt the storage device.

1
1zambos
Member
188
07-06-2016, 12:23 AM
#13
Pros can't just crack the drive without a key. Decryption usually relies on human interaction to obtain the necessary access.
1
1zambos
07-06-2016, 12:23 AM #13

Pros can't just crack the drive without a key. Decryption usually relies on human interaction to obtain the necessary access.

I
icantswim
Member
112
07-06-2016, 12:28 AM
#14
Yes, you can accomplish this discreetly.
I
icantswim
07-06-2016, 12:28 AM #14

Yes, you can accomplish this discreetly.

Y
ybemy
Member
227
07-07-2016, 01:26 AM
#15
There are numerous methods to break or guess encryption. With sufficient resources, you might not need a key. This process is known as cryptography, which relies heavily on mathematics. If you truly wanted the information first, you'd eliminate the person and make it undetectable.
Y
ybemy
07-07-2016, 01:26 AM #15

There are numerous methods to break or guess encryption. With sufficient resources, you might not need a key. This process is known as cryptography, which relies heavily on mathematics. If you truly wanted the information first, you'd eliminate the person and make it undetectable.

S
Seve_PT
Member
229
07-07-2016, 02:07 AM
#16
It's real, but you won't be tackling the whole drive yourself. If the FBI is pushing firms to add hidden backdoors, it's not something you should try alone.
S
Seve_PT
07-07-2016, 02:07 AM #16

It's real, but you won't be tackling the whole drive yourself. If the FBI is pushing firms to add hidden backdoors, it's not something you should try alone.

B
BrownCoffee
Member
72
07-07-2016, 02:54 AM
#17
Someone employed by the government could potentially achieve this if they have direct access to the system.
B
BrownCoffee
07-07-2016, 02:54 AM #17

Someone employed by the government could potentially achieve this if they have direct access to the system.

T
Therealchomp
Junior Member
1
07-07-2016, 09:31 AM
#18
@Enderman you are going pretty much off-topic here. Please keep it in the topic and don't make statements like "you could kill" etc.
T
Therealchomp
07-07-2016, 09:31 AM #18

@Enderman you are going pretty much off-topic here. Please keep it in the topic and don't make statements like "you could kill" etc.

D
DerpityDerp44
Member
81
07-07-2016, 02:22 PM
#19
If the PC functions as a thin client, which is typical in business environments.
D
DerpityDerp44
07-07-2016, 02:22 PM #19

If the PC functions as a thin client, which is typical in business environments.

S
Stimpy1809
Junior Member
8
07-07-2016, 03:19 PM
#20
It's accurate, though technically you lack direct physical contact with the storage device. This isn't off the rails. Security measures can always be bypassed. My point was highlighting how your assertion about simplicity depends on having physical access to the hardware. Everyone understands that physical access opens many doors. You could simply remove the drive, connect it to another machine, and retrieve all information. It's not a major vulnerability in the operating system. Rather than relying on passive oversight, consider using the report feature if you're genuinely concerned about the facts.
S
Stimpy1809
07-07-2016, 03:19 PM #20

It's accurate, though technically you lack direct physical contact with the storage device. This isn't off the rails. Security measures can always be bypassed. My point was highlighting how your assertion about simplicity depends on having physical access to the hardware. Everyone understands that physical access opens many doors. You could simply remove the drive, connect it to another machine, and retrieve all information. It's not a major vulnerability in the operating system. Rather than relying on passive oversight, consider using the report feature if you're genuinely concerned about the facts.

Pages (3): Previous 1 2 3 Next