![]() ![]() ![]() ![]() Would such a tool be able to hack a virtual machine? As a side note, he promotes a commercial encryption product in his video description, so. Regarding the video the author claims to have already enabled the two latter recommendations using Dell's Control Point Security Manager, but it seems obviously untrue (encrypted disks are officially unsupported by Kon Boot, see here, here and there), either because the video author mistakenly did not setup these features correctly, or for other reasons. Whether this limitation can help to guard against this attack, I'm not sure. Use full disk encryption, this recommendation being the most important one.Īs a side note, Kon Boot documentation states that it does not work on system where the BIOS available memory is too small.Use Trusted Boot where TPM chip is available (most professional laptops have one, this Dell Latitude has one),.Prevent your computer to boot from an external media by setting appropriate options at the BIOS level and protecting this configuration using a BIOS password,. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |