MacLockPick II
Reviewed by Austin W. Troxell, MSc, CISSP of Cyber Investigation Services.
Introduction
In today’s computing environment of tera-byte hard drives and encrypted file systems, the practice of ‘pull the plug, image at the lab’ is becoming impractical, if not risky.