QUOTE(natakaasd @ Jan 3 2007, 06:44 AM)
I feel they can. Some of the Hardware keyloggers use TEMPEST to detect keystrokes. This is the MOST Advance method, and very few methods to prevent it. But I guess, If so desperate until use TEMPEST,
, Don't bother, much easier.
Cheers!
Hmm... Dunno if this is the right quote but...QUOTE(Wikipedia.org)
TEMPEST is a codename referring to investigations and studies of compromising emanations (CE). Compromising emanations are defined as unintentionial intelligence-bearing signals which, if intercepted and analyzed, disclose the national security information transmitted, received, handled or otherwise processed by any information-processing equipment.
It seems that it's actually used by the government and now for publicity use.
That also means nothing is impossible in this world...
Jan 3 2007, 11:29 AM

Quote
0.0223sec
0.55
5 queries
GZIP Disabled