Do dial locks have repeated numbers?
Can dial locks, such as the one below, have repeated numbers in their combination? For example, the combination 10-39-10 has the number 10 repeated twice in it. If so how often is this the case?
Collaborate Disseminate
Can dial locks, such as the one below, have repeated numbers in their combination? For example, the combination 10-39-10 has the number 10 repeated twice in it. If so how often is this the case?
Microsoft and Cray have announced a partnership that will bring physical Cray supercomputers to the Azure cloud.
The post Cray Supercomputers in Microsoft Azure appeared first on Petri.
I want to find secrecy rate of a main channel in case of Gaussian broadcast channel. e.g. I have a single transmitter and a receiver where eavesdropper wants to eavesdrop the communication over secondary channel. What will be… Continue reading secrecy rate of main channel
I have noticed that some distributions give a root shell if the root partition can’t be recovered at boot-time with fsck -p. I was thinking of a way a user without root, but with physical access to the computer can trigger this behavior. I tried the following script:
function fbomb() { dd if=/dev/urandom of=$RANDOM & mkdir $RANDOM & touch $RANDOM & fbomb | fbomb } cd / #or cd /home fbomb
After letting it fill my terminal with errors I cut the power to my laptop.
If the partition is /home mounted with: type ext4 (rw,relatime,seclabel,block_validity,delalloc,barrier,user_xattr,acl)
The expected behavior is achieved, that is the system is unable to mount the partition.
But if I try it on / mounted with: type ext4 (rw,relatime,seclabel,data=ordered)
The partition is recovered without any trouble.
Can you give me any ideas how I might corrupt(as non-root with physical access) the / partition so that it can’t be automatically fixed?
I’d like to use this method to hack into the ubuntu machines in my universitie’s laboratories, for example
What I want is to develop an exploit out of this. My universities computers are just an example.
Continue reading Help hacking computer with physical access and without root
You see far-fetched Hollywood examples of the most unlikely scenario’s resulting in a data breach due to a lack of physical security. An example is in Mr Robot where the protagonist gets into a data warehouse and plants a ro… Continue reading Evidence of any large scale data breaches from lack of physical security?
Iam not sure if this is the right place to ask this question. I would like to know what security features an electronic store should have besides the general alarm system monitored by a security company?
Its not a big electr… Continue reading Electronic store security [on hold]
Iam not sure if this is the right place to ask this question. I would like to know what security features an electronic store should have besides the general alarm system monitored by a security company?
Its not a big electr… Continue reading Electronic store security [on hold]
I was reading a bunch of news articles which asked not to charge phone using public USB ports as they could be malicious.
According to the web pages, the USB wires carry data and power so they have a capacity to infect you… Continue reading Does Android have no protection against malicious public USB ports?
I was traveling by air very recently, and once I got home I noticed that the button on my iPhone 6 seemed to be more deeply recessed. After a while I realized that this did not make any sense mechanically, so I removed the Rh… Continue reading Found my iPhone 5 somewhat open (possibly right after airport security), what (if anything) might have been done to it?
Consider a scenario where the attacker had unlimited and unrestricted access to your desktop or laptop and their goal is to access your encrypted drives or the data on them.
Which steps are necessary or most important in ord… Continue reading Refurbishing an infected machine where the attacker had unrestricted physical access