Archive
About Bindings in McAfee Endpoint Encryption / SafeBoot
A few people came to me this week and independently asked how to link EEM (SafeBoot) users to directory counterparts, or how to switch them to other directories or user names. Bindings are a key part of the EEM Encryption environment, as they allow automated user management to take place by tracking changes to the user identity in some other system, most commonly Active Directory. Read more…
TrueCrypt vs Peter Kleissner, Or Stoned BootKit Revisited..
This weeks flame war between TrueCrypt and Peter Kleissner had me both upset and laughing at the same time.
For a start, hats off to young Peter (18 years old according to his site), who recently presented at Black Hat his concept for a “universal rootkit” exploit, which, using that older-than-he-is technology of MBR replacement, manages to subvert Windows in such a way as to be able to drop a payload into memory as the computer boots.
I’m not sure, but isn’t that what MBR viruses have done since day one? I guess Peter agrees because his new “Stoned Bootkit” rootkit is named “Stoned” in homage to one of the original MBR Viruses of 1987 Read more…
About Language and Keyboard Settings in SafeBoot…
I just uploaded a page explaining some of the finer details of the language and keyboard routines in the McAfee Endpoint Encryption for PCs and SafeBoot Device Encryption for PC’s (v5) products. I hope it helps some people iron out some implementation questions.
About Keyboard and Language Settings in McAfee/SafeBoot Encryption
Data theft for political gain? No way!
Computerworld today reported that a Dell PC was stolen by some enterprising thieves from John McCain’s Missouri campaign office. While I usually steer clear from commenting on political activities, being only a legal alien and therefore not even able to vote for things I really care about (the local Fire Chief and Sherriff), let alone something so influential as the 44th President of the United States of America, I find myself unable to hold back.
You can read more about the theft from the link above, but of course as this is a blog I’m duty bound to make some observations: Read more…
How to Spend Your Data Protection Dollars
I was speaking last week at a panel of CISO’s when someone asked me the very reasonable question “What’s the most important thing we should do to protect our data?” – What the audience member wanted to know really was, given that he had no budget, and a state mandate impressing on him the need to protect PII (personally identifiable information), what’s the minimum he could do to comply with the regulations? Read more…


Comments