thang ornithorhynchus
2009-02-19 23:05:53 UTC
The BIOS keyboard buffer retains the pre-boot PW for Drivecrypt plus
pack (and TRuecrypt, possibly others). This can quite easily be
extracted via USB tools or more sophisticated means up to X time after
boot, in plain text. Major hole in the process. I need to know if
there is an automated utility which will invoke with M$ and flush the
buffer? Even a DOS routine, BASIC or similar which can be batched?
Any ideas?
thang
pack (and TRuecrypt, possibly others). This can quite easily be
extracted via USB tools or more sophisticated means up to X time after
boot, in plain text. Major hole in the process. I need to know if
there is an automated utility which will invoke with M$ and flush the
buffer? Even a DOS routine, BASIC or similar which can be batched?
Any ideas?
thang