his post is not meant to be a sure method for defeating attackers. Rule number one in computer security is that if an attacker has physical access to your machine, all bets as to data integrity and physical safety are off. However, than doesn’t mean that you can make the process so tedious and time consuming for the attacker, that he will likely not bother and move to another victim. This post is about those methods. If they’re going to attack you, why not at least make it challenging for them?
http://pthree.org/2010/01/03/how-travel ... heir-data/
General discussion about Linux, Linux distribution, using Linux etc.
1 post • Page 1 of 1
Who is online
Users browsing this forum: No registered users and 2 guests