Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
Bill Bogstad wrote: > So you need to both cut the power and prevent physical access for a few minutes. If an attacker has physical access to the live system then cold boot attacks are among the least of your worries. -- Rich P.
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |