Pages

Thursday, March 01, 2007

Black Hat Demonstrations Shatter Hardware Hacking Myths

Unless you were at Black Hat on Feb. 28, you probably woke up safe in the assumption that if a rootkit hit your system, reimaging would remove it. You probably also thought that the best way to search a PC's volatile memory, or RAM, was by grabbing it with a PCI card or a FireWire bus.

You were wrong.

No comments:

Post a Comment