Safe mode bypass. Consider a very large enterprise that's frequently targeted by competitive intelligence spies. If these spies get hold of a senior executive's laptop with strategically important data, how difficult would it be for them to boot the machine without the USB token? As it turns out, it would be child's play--with the exception of the Griffin Technologies offering. Why? Because the spy could boot up in safe mode, completely bypassing the token and its software to access the hard drive.
The vendors say enterprises that employ file and folder encryption products or PKI solutions won't have this problem. That's reasonable if encryption and PKI are already part of the enterprise security strategy.
But, even in that case, what's really providing the protection? It's the encryption and/or PKI, not the token/software, which begs the question: Do token products provide any value beyond convenient storage of application/Web credentials? The network logon component certainly isn't providing an additional layer of security, and, if a bad guy can crack or steal the network password, he can boot in safe mode with network support and manually login to the network.
Given the advancement of today's programming technology, it should be easy to build a mechanism that prevents or controls authenticated access via safe mode--Griffin Technologies has already proven that it can be done.
If and when these security flaws are addressed, you will be able to judge the products on their merits--ease of installation and configuration, administration and the range of features they support (see "USB Token Features").
I took that from there site. I would sign on using the admin account.
<a href=\"http://photobucket.com\" target=\"_blank\"><img src=\"http://i4.photobucket.com/albums/y107/The51/photoshops/1.jpg\" border=\"0\" alt=\"Image hosting by Photobucket\"></a>