Recent content by Oblivion77

  1. Oblivion77

    Question Concerned if damaged hardware parts when removing bottom cover on laptop

    Do anyone else have more to add regarding: 1. Is there any noticeable bent or damage on the hardware, on the photos (see photos below)? 2. When looking thoroughly on the hardware parts, what should I look for regarding if bent og damaged? 3. How much can the hardware parts with printed...
  2. Oblivion77

    Question Concerned if damaged hardware parts when removing bottom cover on laptop

    As for: 1. Is there any noticeable bent or damage on the hardware, on the photos (see photos below)? 2. When looking thoroughly on the hardware parts, what should I look for regarding if bent og damaged? 3. How much can the hardware parts with printed circuit boards bend, before taking damage...
  3. Oblivion77

    Question Concerned if damaged hardware parts when removing bottom cover on laptop

    Could you try to elaborate? That I focus on the MOBO? Or that I focus on the parts where the housing broke? Or that I focus on the parts where was bending the corner of the bottom cover? Would you try to come with an educated guess? That the flat side of the PCB can bend a couple of...
  4. Oblivion77

    Question Concerned if damaged hardware parts when removing bottom cover on laptop

    Dear all When I was separating the bottom cover on my laptop with a plastic plectrum. Without any problems I separated / loosened the bottom cover on the left side and right side, and most of the front side. It wouldn’t let go at the front, in front of the mousepad – I was missing to unscrew...
  5. Oblivion77

    News Researchers snoop data from air-gapped PC's RAM sticks by monitoring EM radiation from 23 feet away

    All the methods to hack air-gapped systems, do they all require malware on the targeted system to work? Also the one with SATA-cables?
  6. Oblivion77

    News Researchers snoop data from air-gapped PC's RAM sticks by monitoring EM radiation from 23 feet away

    All the methods to hack air-gapped systems, do they all require malware on the targeted system to work? Also the one with SATA-cables? What about: 1. Could my data be stolen throuh the charger cord aswell? 4. Could a not-jailbroken iPhone be hacked, and used as receiver of the different kind...
  7. Oblivion77

    News Researchers snoop data from air-gapped PC's RAM sticks by monitoring EM radiation from 23 feet away

    Physical access so to install malware on the targeted system? What about the method with SATA-cables, does it also require physical access to the targeted system first, for it to work?
  8. Oblivion77

    News Researchers snoop data from air-gapped PC's RAM sticks by monitoring EM radiation from 23 feet away

    In regard of similar articles https://www.techradar.com/pro/security/rambo-attack-uses-ram-in-air-gapped-computers-to-steal-data https://www.neowin.net/news/researchers-warn-about-new-satan-that-can-hack-air-gapped-pcs-using-sata-cables/...
  9. Oblivion77

    Question Malware using disabled network card and disabled Bluetooth?

    Dear all In recent times, there has been many stories about spycameras being placed in illicit places to spy on people when they are renting a room etc. I was visiting a place one time, and that place had radiator valves like this, with a display...
  10. Oblivion77

    Question Malware using disabled network card and disabled Bluetooth?

    To create the mentioned type of malware? Or To transfer malware from an USB? I would assume the type of malware I describe, is advanced, hard to make etc?
  11. Oblivion77

    Question Malware using disabled network card and disabled Bluetooth?

    Thank you for your reply What if someone got access to the laptop, and transfered the mentioned malware from an USB? Would it reguire exceptional skill to create such a malware? Like NSA level?
  12. Oblivion77

    Question Malware using disabled network card and disabled Bluetooth?

    I am aware of this method aswell. I would disable "boot from USB" in bios Other suggestions? Thank you
  13. Oblivion77

    Question Malware using disabled network card and disabled Bluetooth?

    Thank you for the link Regarding the article you linked 2. Use command prompt I assume, that this draws from the same folder / data location as Event Viewer. Instead of deleting the log in Event Viewer, that data could just be deleted in the folder?
  14. Oblivion77

    Question Malware using disabled network card and disabled Bluetooth?

    There is only one account / admin account The password is very long and unique and with various symbols That was a great idea aswell. Unless they have some kind of auto-delete set up, that deletes the log that shows they logged out. But that would be even more excessive than it already is...
  15. Oblivion77

    Question Malware using disabled network card and disabled Bluetooth?

    That does not show when system was turned on, or similar stuff? Already has strong password That was a great idea Thank you