From: "Dustin Cook" <bughunter.dustin@gmail.com>

| "Kerry Brown" <kerry@kdbNOSPAMsys-tems.c*a*m> wrote in
| news:uoX1I7pOJHA.4700@TK2MSFTNGP03.phx.gbl:

>> "Mark McIntyre" <markmcintyre@TROUSERSspamcop.net> wrote in message
>> news:09jOk.252876$5p1.56150@en-nntp-06.dc1.easynews.com...
>>> Juan I. Cahis wrote:


>>>> To be able to install a keylogger, the user should be logged in with
>>>> Administrator features, and I supposed that the user didn't leave
>>>> the computer unattended *and* powered on *and* logged in, did you?


>>> If the hacker has physical access to the computer, all bets are off.
>>> He can boot from a CD or pendrive and install whatever the heck he
>>> likes on the laptop.



>> If the laptop fully supports bitlocker and bitlocker is used, physical
>> access won't help you gain access to the contents of the hard drive.



| Indeed.


All this has to what is called "Data at Rest" (DAR) and encryption techiniques to be
compliant with DAR protection requirements.


--
Dave
http://www.claymania.com/removal-trojan-adware.html
Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp