Versus71 Posted January 25, 2014 Report Posted January 25, 2014 This inexplicably brief "research" paper presents an interesting physical world attack that may be easily deployed by a determined attacker to compromise many high-security access control systems in use today. Although this paper's findings are hardly groundbreaking (and in some ways, are downright obvious), it includes some cool pictures of what should be most certainly taken into account in risk management, secure zone planning, and when drafting operating procedures for high-risk areas.More info:http://lcamtuf.coredump.cx/tsafe Quote
robyyxx Posted January 25, 2014 Report Posted January 25, 2014 Am mai vazut metoda asta o data de mult la "Escrocherii adevarate", de au furat bani din seif Quote