Re: Administration password

From: Timothy Goddard (
Date: 11/10/04

Date: Wed, 10 Nov 2004 23:23:29 +1300

"Bill Unruh" <> wrote in message
> IF they have local access, encrypting local files helps not at all.
> they can then read everything you type anyway, including passwords.

You're right in that keyloggers are one of the biggest threats to

Encryption does, however, prevent them from extracting confidential files
straight away. If they intend to steal a document and it has no encryption
then with a boot disk they can just mount the hard drive and copy the file
to a disk, bypassing passwords completely. With encrypted documents, they
have to go to the extra trouble of installing a keylogger and catching the
pass-phrase used for encryption.

With a BIOS password, they have to remove the hard drive just to get access
to it. With encryption as well they have to remove the hard drive, connect
it to their computer, install a keylogger, replace the hard drive, and make
sure you don't notice them doing it just to get your confidential
information. Even then they have to wait until you next use your passphrase.

If you're paranoid, install a lock on the case. If you're even more
paranoid, get an RSA smartcard, reader, and keypad for your encryption
software. A lock's probably more effective though, and much less expensive.

If you're more worried about them damaging your system than stealing
information, encryption won't help you. Then again, if they wanted to damage
your system they could just do so physically.

I don't know whether or not you can get a windows version of "tripwire"
(unix/linux) which creates a hash database of system files on a disk and can
be used to periodically check for any alteration. A search might reveal