Hey all, A lot of you have probably seen this on slashdot, but thought I'd post it anyway. It's a short video showing how it's possible to dump the memory of a computer that uses encryption (even if it's off), to gain access to the key and therefore to the encrypted files. "http://citp.princeton.edu/memory/" Cheers, Chris