There was a similar sort of tool that let you take admin access on Netware machines if you had physical access, and I found it invaluable when taking over sysadmin duties from an idiot who'd left in disgrace.
Naturally, there is a way to defeat this "lockpick" - disable USB media automount, and/or close your keychain. Security-minded Macgeeks will have done either/or.
And, if they're law enforcement types, all they need is a warrant.
(no subject)
Date: 2007-05-03 08:41 pm (UTC)There was a similar sort of tool that let you take admin access on Netware machines if you had physical access, and I found it invaluable when taking over sysadmin duties from an idiot who'd left in disgrace.
(no subject)
From:(no subject)
From:(no subject)
From:(no subject)
Date: 2007-05-03 08:46 pm (UTC)(no subject)
Date: 2007-05-03 09:28 pm (UTC)doesnt matter what you put in the way, you can (for a reduculas cost) have the drive platters read by an electron microscope and decypered from there.
though why do i have a feeling even though its "FOR LAW ENFORCEMENT ONLY" that it will be easier to get than a gun...
come on, the term "licenced investigator" in the states is pretyy dubious.
(no subject)
From:(no subject)
From:(no subject)
From:(no subject)
From:(no subject)
Date: 2007-05-03 10:09 pm (UTC)That is all.
- James -
(no subject)
Date: 2007-05-04 09:17 am (UTC)So what's new?
(no subject)
From:(no subject)
Date: 2007-05-04 02:39 pm (UTC)And, if they're law enforcement types, all they need is a warrant.
(no subject)
Date: 2007-05-04 03:01 pm (UTC)Now all I need to do is get a MD5 or sha1 fingerprint of that application.
Again: A way to rip off law enforcement.
(no subject)
Date: 2007-05-04 03:16 pm (UTC)*does so*