NIST STIG * configuration requirements practically demand it.
Pretty sure that unless they changed the passwords before killing the machine, they're well and truly fucked.
They might luck out and the IT guy only relied on Bitlocker (which isn't that hard to bypass), but I wouldn;t bet too much on that.
Yes, STIG is typically DoD, but IIRC it's still the hallmark for how all sensitive government computers/servers/etc are to be configured and maintained.
Yea it's DISA STIG but this is still pretty much right.
Oh and they probably use some kind of VDI (Virtual Desktop Infrastructure) that requires minimum client hardware - basically just a monitor and a box for peripheral plugs and USB media. The actual guts is floating on a hard drive array somewhere in a secure fed datacenter.
Yeah, they needed to sit and export her mail right there, well as much as would be allowed before her account was shut off. Turning it off was the worst thing to do.
Remember kids, these days if you find a computer and want to snoop at what's in it; do not turn it off and expect to be able to get anything later.
a lot of valuable information might be held in volatile memory, which would most likely be lost on any shutdown, but there is still a lot of places information could be salvaged off hidden hard drive sectors, memory swap, page files, etc. so not a totally lost cause
Are you sure about this?
NIST STIG * configuration requirements practically demand it.
Pretty sure that unless they changed the passwords before killing the machine, they're well and truly fucked.
They might luck out and the IT guy only relied on Bitlocker (which isn't that hard to bypass), but I wouldn;t bet too much on that.
Yea it's DISA STIG but this is still pretty much right.
Oh and they probably use some kind of VDI (Virtual Desktop Infrastructure) that requires minimum client hardware - basically just a monitor and a box for peripheral plugs and USB media. The actual guts is floating on a hard drive array somewhere in a secure fed datacenter.
Yeah, they needed to sit and export her mail right there, well as much as would be allowed before her account was shut off. Turning it off was the worst thing to do.
Remember kids, these days if you find a computer and want to snoop at what's in it; do not turn it off and expect to be able to get anything later.
a lot of valuable information might be held in volatile memory, which would most likely be lost on any shutdown, but there is still a lot of places information could be salvaged off hidden hard drive sectors, memory swap, page files, etc. so not a totally lost cause