Highest Rated Comments


smd75jr113 karma

Shameless plug, but here, have my research paper

smd75jr44 karma

What are your thoughts on Cold Boot Attacks?

smd75jr27 karma

Gutsman?

Seriously though, the Gutmann Method was designed for much older drives which used a completely different encoding than is used today and really wont help you any more that a DOD 5220.22-M wipe.

smd75jr13 karma

Haha, Thanks! All of the papers I read while doing the research were so boring and bland that I couldn't just let mine be the same.

smd75jr11 karma

Can you recomend any webpages/sites/books/videos/stone tablets/other media that explain advanced encryption concepts such as (using the wiki article for SHA256 as a reference here) "structure", "rounds", these?

On a mostly unrelated note: How do you actually pronounce your last name? (It has been confusing me for years!)