o1001010 wrote:a little comment.
i think that the current rules about the bios and hd password is a little oximoron. when there is a weakness instead of discussing it openly like any open commnunity i do not understand why it is prohibited. if there is something wrong people should know about it and learn how to address it instead of being an ostrich and hide its head in the sand and pretend it is safe.
ps, the solution can be easily found with google.
sincerely,
o1001010
Indeed, to me it seems very silly to pretend something is safe by ignoring the workarounds. This will mainly lead to people thinking they have safely secured their stuff! Only to find out that when the laptop or drive gets stolen, all data on the drive is accessible to people who can do whatever they want with it (identity theft anyone?!).
This whole fingerprint stuff is equally unreliable (only a marginably better option for people who are afraid that their OS login password is copied by someone looking over their shoulder).
Imo, if you want to protect a HDD, the only currently safe thing to do is to use full-drive encryption with BitLocker or TruCrypt (use the latter one only without hibernation in Windows). Further more, this is only truely safe if nobody can get their hands on the laptop in a powered or S3 (standby) state. There are many ways to read out the RAM (and thus encryption key) without needing to be logged into the OS.
Even then, this security is only temporary (until a weakness in the algorythm is found or until brute-force cracking becomes a viable option).