Quote: |
KDan writes "As reported by numerous sources, a new vulnerability has been disclosed (and patched) by Microsoft. This one concerns the parsing of JPEGs in XP Microsoft applications. A buffer overflow can be used to execute arbitrary code. So all those times you told your parents/friends that looking at images was safe - well, not anymore." |
Quote: |
Saint Aardvark writes "Lexar describes the JumpDrive Secure as "loaded with software that lets you password-protect your data. If lost or stolen, you can rest assured that what you've saved there remains there with 256-bit AES encryption." @stake has a different take: The password can be observed in memory or read directly from the device, without evidence of tampering." And best of all, the punch line: "[The password] is stored in an XOR encrypted form and can be read directly from the device without any authentication." That's why I use ROT-13 for my encryption needs." |
@stake wrote: |
The Safe Guard
software takes care of the decryption and the password can be seen in plain text within memory when the software does a compare between the stored password and the supplied password. |
Cyan~Fire wrote: |
That is true, but then you can always generate a matching hash. :-) |
Quote: |
That is true, but then you can always generate a matching hash. |