Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Does perfect security exists?


  • Please log in to reply
6 replies to this topic

#1 resertedlab

resertedlab

  • Members
  • 143 posts
  • OFFLINE
  •  
  • Local time:10:13 AM

Posted 29 October 2016 - 06:17 AM

This is bit of a general question. If you have passwords to all of your BIOS/UEFI settings, you have disabled  CD/USB boot , if you have your C: encrypted and good Windows password, is there still any possibility that someone can access your files/install something, if he has physical access, and even if we assume that he has the same laptop and switches the hards? And to remain completely undetected - without password reset or changing, so next time you log you to never notice that someone did something. 

 

I am asking in order to protect myself if i need to leave my machines unnatended in the future!


Edited by resertedlab, 29 October 2016 - 06:23 AM.


BC AdBot (Login to Remove)

 


#2 SpywareDoc

SpywareDoc

  • Members
  • 676 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Maryland, USA
  • Local time:04:13 AM

Posted 29 October 2016 - 05:48 PM

... is there still any possibility that someone can access your files/install something, ...

 

 

Yes. Here's the latest way: https://breakingmalware.com/injection-techniques/atombombing-brand-new-code-injection-for-windows/


Edited by SpywareDoc, 29 October 2016 - 05:49 PM.


#3 resertedlab

resertedlab
  • Topic Starter

  • Members
  • 143 posts
  • OFFLINE
  •  
  • Local time:10:13 AM

Posted 30 October 2016 - 10:43 PM

Damn, i bet thats not the only one..



#4 rp88

rp88

  • Members
  • 3,016 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:08:13 AM

Posted 01 November 2016 - 05:21 PM

Perfect security has never, does not and never will exist. Simply because for every security system of any kind (and this goes for all forms of such systems of every type imaginable) there must be a way for certain things/users/people/information/objects/... to be let past and there is always a way that something/someone which/who should not get past can follow that route through. Even in an utterly perfect system a human component still exists somewhere and humans can make mistakes, be tricked or even decide to switch sides. All anyone can ever hope for is security good enough to vastly outmatch the efforts likely to be directed against it. For your specific question, maybe in theory there is not but in practice there will almost certainly be a vulnerability in some of those things which has yet to be discovered and patched, any complex piece of computer code is almost certain to have a few such flaws, a sufficiently skilled attacker could make use of such a vulnerability.
Back on this site, for a while anyway, been so busy the last year.

My systems:2 laptops, intel i3 processors, windows 8.1 installed on the hard-drive and linux mint 17.3 MATE installed to USB

#5 Kikobrian55

Kikobrian55

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:04:13 PM

Posted 05 February 2017 - 05:48 AM

Of course not, specially it concerns computers



#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,470 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:04:13 AM

Posted 05 February 2017 - 06:51 PM

I have posted this before so maybe it's time to say it again.

Four Easy Steps that will prevent malware infection:
1. Disconnect from all wired and wireless network connections (Ethernet, Bluetooth, Infrared, Router, Wifi, Cable Satellite, Modem)
2. Remove all CD/DVD-ROM/DVD-RAM drives (and floppy disk/zip drive if you still have one).
3. Carefully super glue or expoxy shut ALL other connectors, especially Firewire/USB ports and Ethernet cable port. Advanced users can use high grade solder instead.
4. Hide the computer in an safe place where no other users have access and it will not be prone to any dreaded dust bunny attacks.

Now you can relax, kick back and enjoy a cup of coffee knowing cyber criminals cannot access your computer or personal data. As the Great One would say..."How sweet it is."

9BN6F-1456499535-2123-list_items-gleason
 
.
Seriously, no single product is 100% foolproof and can prevent, detect and remove all threats at any given time.

Security is all about layers and not depending on any one solution, technology or approach to protect yourself from cyber-criminals. The most important layer is you...the first and last line of defense. Unfortunately, it has been proven time and again that the user is a more substantial factor (weakest link) in security than the architecture of the operating system or installed protection software. Cyber-criminals succeed because they take advantage of human weaknesses...relying heavily on social engineering to exploit the the weakest link in the security chain.

Thus, a multi-layered defense using an anti-malware and anti-exploit solution to supplement your anti-virus combined with common sense and following Best Practices for Safe Computing provides the most complete protection.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#7 Ziltoid

Ziltoid

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:UK
  • Local time:09:13 AM

Posted 14 February 2017 - 05:54 PM

I have posted this before so maybe it's time to say it again.

Four Easy Steps that will prevent malware infection:
1. Disconnect from all wired and wireless network connections (Ethernet, Bluetooth, Infrared, Router, Wifi, Cable Satellite, Modem)
2. Remove all CD/DVD-ROM/DVD-RAM drives (and floppy disk/zip drive if you still have one).
3. Carefully super glue or expoxy shut ALL other connectors, especially Firewire/USB ports and Ethernet cable port. Advanced users can use high grade solder instead.
4. Hide the computer in an safe place where no other users have access and it will not be prone to any dreaded dust bunny attacks.

Now you can relax, kick back and enjoy a cup of coffee knowing cyber criminals cannot access your computer or personal data. As the Great One would say..."How sweet it is."

MTIwNjA4NjM0MDU0NDc3MzI0.jpg
 
.
Seriously, no single product is 100% foolproof and can prevent, detect and remove all threats at any given time.

Security is all about layers and not depending on any one solution, technology or approach to protect yourself from cyber-criminals. The most important layer is you...the first and last line of defense. Unfortunately, it has been proven time and again that the user is a more substantial factor (weakest link) in security than the architecture of the operating system or installed protection software. Cyber-criminals succeed because they take advantage of human weaknesses...relying heavily on social engineering to exploit the the weakest link in the security chain.

Thus, a multi-layered defense using an anti-malware and anti-exploit solution to supplement your anti-virus combined with common sense and following Best Practices for Safe Computing provides the most complete protection.

+1.

If someone wants to compromise your security enough, providing they have the skills or knowledge, they will compromise it.

 

Make yourself as small as possible as a target, maximise their effort, minimise their reward, and hope for the best. 

Good luck!


Edited by JSullivan1990, 14 February 2017 - 05:55 PM.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users