First of all, thank you for reading this. I have to write a paper which will serve as an prelude to my B.A. paper, and the theme is physical access penetration techniques (well, my mentor doesn't like this title). So if you're up for some link posting or just name mentioning, to point me in the right direction, please help. And if any of you ever gets stuck in Croatia, contact me and well go and have a couple of beers and some home brew schnapps.
This is what I have so far:
BIOS: backdoor passwords, battery removal
Windows: rainbow tables, SAM injection, live Linux distro and browsing around
Linux/UNIX: live Linux distro and browsing around
Automatic data gathering: USB switchblade
Thanks again