24 February 2008

Hacking computer hard disks

Computer security researchers have developed a method to steal encrypted information stored on computer hard disks. The method which could destabilize security software shielding critical data on computers is as straightforward as chilling a computer memory chip with a blast of frigid air from a can of dust remover. Encryption software is used by companies and government agencies in portable computers that are particularly subjected to theft. This threatening process could exploit the vulnerability of the dynamic random access or dram chip. These chips momentarily hold data including the keys to modern data scrambling algorithms. When we shut down the computer, the data is actually said to disappear. It has been found that these standard memory chips in reality retain data after power is cut off. When the chips were chilled using a reasonably priced can of air, the data was frozen in place allowing the researchers to easily read the keys out of the chip’s memory. We can change their inherit nature and permit them to hold their state for hours at least without the consumption of power by cooling the chips in liquid nitrogen (-196c). It is enough if we put the chips back into a machine and now we can read out their contents. Special pattern recognition software must be used to identify security keys among the copious amounts of data on the memory chip.

1 comment:

Shankar said...

Nice post da......