What is a cold shoe?

A cold shoe, also called a cold start or hard shoe, is the starting method of starting a computer in which the machine starts to turn on, or a specific feature is sent to the computer processor that starts restart. In the normal process of cold shoes, a small program performs a small program. This process will be launched by another program that loads the operating system. A cold boot attack is a hacker attack based on a computer. The original term drew from the phrase, "pulled with his own bootstraps." In an endless sentence, man was sufficiently self -sufficient to withdraw from the ground by pulling the loops on the back of the couple of cowboy shoes. In the calculation, the computer was sufficiently self -sufficient that once the sequence was started, it was able to load its own operating system. Finally, the term was shortened to the simply "load of the shoe" or "boot".

When a computer of cold shoes runs a series of predefined steps that culminated in loading the operating system. Generally, the first steps are carried out by the basic input/output systemMP (BIOS), when it performs hardware car-tests, looks for a starting unit, and then performs the starting loader program. Boot Loader continues to start the truncation process by actually loading the operating system. Some systems have one or two more steps, such as a loader on the second stage or another hardware step, but this is still a basic process.

Most cold shoes include users of the power button on the computer, but this is not the only method. It is also possible to send a specific type of restart signal to the computer processor. This signal bypasses all the off and storage procedures and restarts the computer as if it was turned off. Although it may seem to the user as a random restart of the computer, it is actually raznova and may signal an attempt to attack a cold boot.

When attacking a cold boot, the hacker sends a reset signal to the powered computer. By doing soReset the machine and bypasses normal shutdown processes. One of these processes is to delete information from the computer's memory. If the memory is read fast enough in a restarted computer, a hacker can be able to obtain information that would be locked at the previous boot. The common objectives of the cold boot attack are login information and computer encryption keys.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?