First let me say I don't post here extremely often and I really apologies if this is the wrong section to post this.
I've read 4 or 5 articles on the matter and I haven't read any answer to my question. Am I correct in thinking that a person needs Actual Physical access to the drive? Or can they do it remotely through malicious software as well? Sorry if these are dumb questions 🙁
Another question is as far as encryption software, does anyone have a recommendation for a good one? Thank you
I've read 4 or 5 articles on the matter and I haven't read any answer to my question. Am I correct in thinking that a person needs Actual Physical access to the drive? Or can they do it remotely through malicious software as well? Sorry if these are dumb questions 🙁
Another question is as far as encryption software, does anyone have a recommendation for a good one? Thank you