blazorthon
Glorious
[citation][nom]curtis_87[/nom]Am I the only one that thinks bootcd==>create a new admin account in the SAMS database then strip the old user account of password, and you are in as the old user with no password. 10 min job...on windows..does it even matter if the drive is encrypted?[/citation]
If the drive is encrypted then you can't do anything with it at all unless you manage to crack the codes somehow or have the codes. An encrypted drive can mean that everything is encrypted, including the OS and the OS's bootloader. What happens is either a secure bootloader that allows you to decrypt the drive then boots into the bootloader, then into Windows or whatever you have on the drive.
You can even just put the decrypting bootloader onto a different media, making the hard drive useless without the media that the boot loader is stored on. There are even more possibilities. You can only crack this stuff if someone is stupid with their codes or uses a more easily broken encryption algorithm such as DES instead of AES, Serpent, etc.
There are even more things that you can do. There are these awesome little things called key files. They are basically entire files that are used as codes or to supplement codes. Some encryption supports key files of up to 16MB or higher, that's like a 134217728 bit code! Honestly, the sky's the limit for encryption and local data protection. We only have data and privacy problems when we are online where other groups can get to our data.
There are even more things to learn about encryption, but I have no intention of typing a massive report on it.
If the drive is encrypted then you can't do anything with it at all unless you manage to crack the codes somehow or have the codes. An encrypted drive can mean that everything is encrypted, including the OS and the OS's bootloader. What happens is either a secure bootloader that allows you to decrypt the drive then boots into the bootloader, then into Windows or whatever you have on the drive.
You can even just put the decrypting bootloader onto a different media, making the hard drive useless without the media that the boot loader is stored on. There are even more possibilities. You can only crack this stuff if someone is stupid with their codes or uses a more easily broken encryption algorithm such as DES instead of AES, Serpent, etc.
There are even more things that you can do. There are these awesome little things called key files. They are basically entire files that are used as codes or to supplement codes. Some encryption supports key files of up to 16MB or higher, that's like a 134217728 bit code! Honestly, the sky's the limit for encryption and local data protection. We only have data and privacy problems when we are online where other groups can get to our data.
There are even more things to learn about encryption, but I have no intention of typing a massive report on it.