Questions about computer theft........!

No, it doesn't.

Once you have the pc booted and windows is loaded ready for logon it's game on for anyone who wants to access the data on that pc.

Disk encryption offers security, regardless of whether Windows has a password or not.

So yeah,

We are on about a desktop pc tho. The thief would have to kill the power to it to steel it:D
 
we use Bitlocker extensively for all our mobile users and the only downside is that when one of our plonkers leaves a laptop at a hotel for example the lost property guys cant get in to it and work out who it belongs to.

A combination of a Bitlocker'd drive and a complex password policy is enough to pass most UK and US government security requirements and is way enough for a home user. It is also good enough to allow our company to have over £100m public liability insurance, which is good enough for me then as well.
 
I do have a desktop btw.

Ive found lastpass to cure my chrome woes and a redesigned drive file system to cure my google drive woes but what about remote wiping in case of theft?

**edit**

and i have bitlockered an external drive
 
I do have a desktop btw.

Ive found lastpass to cure my chrome woes and a redesigned drive file system to cure my google drive woes but what about remote wiping in case of theft?

**edit**

and i have bitlockered an external drive

I'm not sure remote wiping is really worth it. It'll only really work if the thief is stupid enough to connect your PC to the internet, without that there's no way of telling your PC to remotely wipe like an iPhone for example unless you somehow rigged it to automatically wipe if it couldn't detect something on your own network when turned on? lol risky if for some reason that "thing" was inaccessible :p
 
Windows password is pointless apparently as anyone who wants to get into your windows account will easy, there's even stuff to download on the net that will get passed a windows password. No idea if they actually work, or even window passwords are that easy to get passed, but ppl say they are?

Took me less than 10 minutes to get past the admin password on a server 2008 R2 box. Including the time taken to google it.
 
It does when coupled with disk encryption.
No, it doesn't.

Once you have the pc booted and windows is loaded ready for logon it's game on for anyone who wants to access the data on that pc.
No, not for "anyone," for "anyone who realises (or guesses/assumes) the computer is running full disk encryption, and has the tools and knowledge to erase or crack the logon password without a reboot or poweroff." What proportion of your average scumbag tealeaves fall into that category?

If you're worried about a more serious threat, you'd also likely be worrying about potential "evil maid" attacks which could compromise your disk encryption itself, and you'd need to make sure the PC was physically secured whenever it was unattended in any case.
 
Anyone with a CISSP qualification will tell you that any password is insecure if the hacker/thief/a-hole has physical access to the box he is trying to gain access to. However having encrypted volumes will make his life a lot, LOT harder.

Mainly on Windows because you cant just blat the SAM database etc.
 
A windows password offers no security what so ever.

Errr...Yes it does.

As already mentioned, how many average thives are going to know all the ways to get round your computers security?

A laptop was left to a friend recently which had bios drive encryption, windows passwords and even a bios Boot/Setup password. I circumvented all the passwords except the Windows Passwords, then I wiped the drive and stuck a fresh install on it. The user did not need any old files so it just wasn't worth the time. I just made the laptop in question useable again.

Your average Joe could not crack the Windows password, let alone all the BIOS passwords and any other methods of security the user may have in place. You are correct in saying that data is very rarely completely safe, (if that is what you mean), but to say the Windows Password is pointless is not correct either as most thieves will just wipe the computer or remove the hard drive anyway, therefore securing the data on there.

In simple terms, the Windows Password is always a good idea as it will act as another barrier to your data and should safeguard from most people out there.
 
I circumvented all the passwords except the Windows Passwords

M3NRvvs.gif
 
To a certain extent it depends on the laptop. A corporate level machine like a ThinkPad you can't circumvent the supervisor or hard drive passwords.
 

Nice to see you can quote something out of context and know how to post an image in an attempt to look clever. How about you actually try and use the matter between your ears and answer my full post? Then I can explain the part you didn't understand.

MagicBoy said:
To a certain extent it depends on the laptop. A corporate level machine like a ThinkPad you can't circumvent the supervisor or hard drive passwords.

I know there are laptops which can't be cracked so easily, the particular one I did I don't think was a business model laptop, however the main point of the post was not to expect your data is ever 100% safe.

linktoinsanity said:
In simple terms, the Windows Password is always a good idea as it will act as another barrier to your data and should safeguard from most people out there
 
Nice to see you can quote something out of context and know how to post an image in an attempt to look clever. How about you actually try and use the matter between your ears and answer my full post? Then I can explain the part you didn't understand.

I'm not the one bragging about resetting the bios to clear a password. :rolleyes:

But here's your dummy back.
 
Last edited:
I'm not the one bragging about resetting the bios to clear a password. :rolleyes:

No, your the one misinterpreting what I was saying because you aren't bright enough to understand what the post said. I'll repeat it again so it may go in.

linktoinsanity said:
however the main point of the post was not to expect your data is ever 100% safe.

Understand? Or would you like it spelt out to you? :rolleyes:
 
No, your the one misinterpreting what I was saying because you aren't bright enough to understand what the post said. I'll repeat it again so it may go in.

I understand your post, but I also understand that you struggled to clear a windows password. But you also claim to be able to circumvent "bios drive encryption".

linktoinsanity << Can get through encryption, can't access windows.

Really? :rolleyes:

Stop chatting ****.
 
I understand your post, but I also understand that you struggled to clear a windows password. But you also claim to be able to circumvent "bios drive encryption".

linktoinsanity << Can get through encryption, can't access windows.

Really? :rolleyes:

Stop chatting ****.

I didn't say I couldn't circumvent the Windows password, I said I didn't bother as they user did not need any of the data on there.

linktoinsanity said:
A laptop was left to a friend recently which had bios drive encryption, windows passwords and even a bios Boot/Setup password. I circumvented all the passwords except the Windows Passwords, then I wiped the drive and stuck a fresh install on it. The user did not need any old files so it just wasn't worth the time. I just made the laptop in question useable again.

Of course I could have done if I wanted to.

I thought my post was pretty clear to be honest. :confused:
 
Back
Top Bottom