Reply to post:

Sysadmin cracked military PC’s security by reading the manual

Wensleydale Cheese

"Early in my IT support career I learned that a way past O/S security constraints was to treat the media as data to a different O/S."

I recall a certain Word document which had some "interesting" history, but hidden from view for Word users.

I forget what protection was in place, but dropping it onto a non-Windows O/S and dumping the raw contents of the file revealed all, in clear text.

It's also a good technique for discovering files which Windows hides.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Biting the hand that feeds IT © 1998–2019