http://www.theinquirer.net/default.aspx?article=32783
by the way, this article isn't only on the inquirer.
by the way, this article isn't only on the inquirer.
Agreed 110%! :thumbsup:Originally posted by: drag
Of course like anything.. If your in control TPM and such is good, if other people are in control then it's bad.
Wouldn't that require the rootkit to modify the BIOS so that it loads itself before a CD-ROM is allowed to boot the system? Otherwise, I don't understand how the rootkit could be loaded if the CD-ROM were booted directly, entirely bypassing anything on the hard disk.Originally posted by: drag
...
You try to boot up the cdrom and it will work 100% perfectly, but you could be booting up on a hypervisor and not know it. Theoreticly.
That's what is so remarkable about these sorts of attacks.
Originally posted by: ProviaFan
Wouldn't that require the rootkit to modify the BIOS so that it loads itself before a CD-ROM is allowed to boot the system? Otherwise, I don't understand how the rootkit could be loaded if the CD-ROM were booted directly, entirely bypassing anything on the hard disk.Originally posted by: drag
...
You try to boot up the cdrom and it will work 100% perfectly, but you could be booting up on a hypervisor and not know it. Theoreticly.
That's what is so remarkable about these sorts of attacks.
