Sunday, January 15, 2012

Microsoft denies BitLocker hard disk to add close tool to be defeated to solve

[dispatch of dog stairs for c dog crates large ar Sai Di dvd discovery best buy net] on December 10 message, according to foreign media coverage, senior manager Paul Cooke denies Microsoft the BitLocker hard disk of Microsoft adds close tool to had been defeated to solve.

usb harddrive enclosure

In a few weeks in the past, a few reports say Microsoft BitLocke the most popular selling dog stairs r hard disk adds close tool to exist a few weaknesses. Some reports say commercial software can defeat solution BitLocker. A kind of when the earthquake sounds of mistake of a report that Arstechnica website publishs says Passware software company is rolled out new tool can defeat solution BitLocker.



Senior manager Cooke is in Microsoft this kind of statement was denied in this rich guest that Zhou Yifa expresses. He says, this hard disk adds close tool to be able to restore hard disk to add close close key. This depends on the physical mirror of memory is this hypothesis that can visit. If you are done according to the optimal way guideline of BitLocker, won't a most popular selling dvd discovery ppear this kind of circumstance.



Cooke explanation says, the target of BitLocker is protection rest (shut power source in the machine namely later) data. If baleful user can the system that physical visit is running, he duplicates with respect to the administrator limits of authority that can use this machine the memory content in this computer, perhaps use the hardware method such as direct visit memory to undertake duplicating. This weakness is not to have BitLocker only abil the best selling dog stairsity some. Any hard disk add close software to have this kind of effect.

hans wilhelm

Another report that Fraunhofer SIT publishs says, if aggresso dog stairs and ramps r can visit this ph the most popular selling dog crates large ysics machine for many times, with respect to meeting breach BitLocker. Cooke explanation says, this kind of method is the PIN of the user that aggressor can acquire an operating system to be collected beforehand with cheating means, so that apply later,rise this PIN memory next, start the identity that enters user PIN to identify information to collect afresh next. Next, aggressor needs physics the 2nd times to visit that notebook computer to be mixed with the PIN of extraction user the attack most popular selling dog crates large that finish. Cooke says, the risk is lower for this kind of user that BitLocker safe tool uses in atttacking real to be in world.



(Responsibility edits: Postscript Tuo Luo Zun person)



Author: Tian Hong

No comments:

Post a Comment