|
You are here |
www.elcomsoft.com | ||
| | | | |
blog.elcomsoft.com
|
|
| | | | | In the world of digital forensics, there are various ways to analyze computer systems. You might be familiar live system analysis or investigating forensic disk images, but there's yet another method called cold system analysis. Unlike live analysis where experts deal with active user sessions, cold | |
| | | | |
reverse.put.as
|
|
| | | | | These last days I must be set on a Apple devices destruction mode. First I lost access to my MacBook while trying to increase its physical security - I configured it to boot from network and I lost all access to boot sequence commands. I think my model has an EFI bug because the security-mode set to full doesn't ask for a password when I start/restart my laptop, only asks for password if I want to boot from other devices. | |
| | | | |
www.mac4n6.com
|
|
| | | | | ||
| | | | |
www.sgclark.com
|
|
| | | ontelligent: pickupthatamulet: OMG I LOVE HIM I just love this. This is awesome. Very funny | ||