Results 1 to 5 of 5

Thread: Need information in full disk encryption and sleep mode

  1. #1
    Join Date
    Apr 2011
    Posts
    66

    Need information in full disk encryption and sleep mode

    I've done a full disk encryption with BitLocker and TrueCrypt on my laptop and desktop, respectively. If I just put my laptop on standby waiting / when I leave, I realize that I'm alone I asked for Windows (Vista) password when I wake up. Does this mean that if someone steals my laptop while within sleep mode, the disk encryption will not facilitate? It seems to recommend that "give the Prompt for password when computer resumes from sleep setting is sufficient to mitigate risk. So I'm confused. What if I hibernation? Is that enough?

  2. #2
    Join Date
    Jun 2009
    Posts
    1,205

    Re: Need information in full disk encryption and sleep mode

    You raise some good problem, ones I acquire asked repeatedly about Whole Disk Encryption products. So WDE does not protect against rootkits, viruses and other malware. Does not protect against bad dreams and so cleaning does not provide the same level of protection as hibernation. Place the system in hibernation will Authentication Bit Locker resting on restart, where the dream is based on the Windows credentials and is not a known attack but potentially non-realist against this. Hope that clears some things up.

  3. #3
    Join Date
    Mar 2009
    Posts
    1,221

    Re: Need information in full disk encryption and sleep mode

    The dissimilarity lies in the actuality that "the dream" will not turn on the system, while the "hibernation" does. The dream state is also known as the Suspend to RAM - meaning that the system is placed in a mode of very low power consumption, but is still on. When you wake up from sleep mode, the systems are in the same state you left it. You can protect the clock; just like you can password protect the screen saver.

  4. #4
    Join Date
    May 2008
    Posts
    1,304

    Re: Need information in full disk encryption and sleep mode

    Hibernation, however, is to suspend to disk. By entering hibernation, the contents of RAM are written to a file reserved on disk, and the system is off physically. As soon as you turn the computer on, it will perform the whole thing as though you were turning it on intended for the first time. It will go through the BIOS POST, load the boot loader you need your password to decrypt the disk and load the operating system. Once charging starts, the operating system (Windows in your case) is detected that a state of hibernation stored, and charged that state back to the RAM.

  5. #5
    Join Date
    Nov 2008
    Posts
    1,066

    Re: Need information in full disk encryption and sleep mode

    PGP Whole Disk Encryption is completely companionable through hibernation into Windows. If the PGP Whole Disk Encryption System in support of Windows goes within hibernation, inside restoring power to the system, the BootGuard PGP will inquire for your password. Following entering your password resting on the disk is decrypted and returned to its earlier state. Complete disk encryption capable of be a great anti-forensic technique, however there is a risk that the malware as a keylogger are able to be installed through a lack of superior anti-virus and anti-malware.

Similar Threads

  1. Replies: 4
    Last Post: 01-07-2013, 11:01 AM
  2. How to deal with full disk encryption on mac os x lion
    By Bhukkam in forum Operating Systems
    Replies: 5
    Last Post: 02-05-2011, 11:08 PM
  3. Lenovo ThinkPad T61 Full Disk Encryption
    By Madhulika in forum Portable Devices
    Replies: 6
    Last Post: 25-06-2010, 11:39 AM
  4. Replies: 4
    Last Post: 06-04-2010, 12:41 AM
  5. full disk encryption "Backup"
    By EDALENE in forum Networking & Security
    Replies: 2
    Last Post: 25-10-2008, 02:27 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,264,285.68896 seconds with 16 queries