![]() With flash memory based SSDs or USB drives, re-write the same part of memory over and over to have it reach its end of life sooner. If it is a laptop, it may be possible to wreck the battery by reprogramming it: The microcode on some CPUs can be amended: wreck the CPU. Someone has mentioned flashing the BIOS to wreck that. By changing screen mode repeatedly very fast, it was possible to destroy this relay.Īpparently some modern monitors can be wrecked by forcing them into invalid screen modes, but they must be pretty rubbish monitors. On some CRT monitors there was a relay that was engaged when changing screen mode. They might simply have been interested in doing damage, or compromising the computer in some way. In this case in what ways could my computer still be compromised or damaged? We can say that the malicious user knew I might format the drive, and prepared especially for that. I then boot from a Linux live CD, format the internal drive of the computer, and install a clean installation of an operating system (Either Windows 10 or Debian, for example.) there are no other storage devices connected to the computer. The malicious user can spend a few hours doing whatever they want.Īfter the malicious user is done, the computer is immediately shut down. ![]() The peripherals like USB keyboard, mouse, etc, are disconnected the moment he gets access. I give a malicious user remote access to this machine, through the software TeamViewer. This is a normal system, and not a virtual machine. ![]() The computer is not sharing a local network with any other devices. I have a normal desktop computer with a clean installation of Windows 10 and no personal or sensitive data on the machine at all. Hypothetical scenario (please note that this is indeed hypothetical, and I would never dream of actually doing this. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |