I have seen this *five* times already - is there some sort of wierd mailing
loop in action?
I am fairly certain I haven't sent it five times spread out over two
days
Jim Choate wrote:
On Sat, 8 Feb 2003, Sunder wrote:
In real life this will not work as most Windoze hard disk encryption
schemes can't encrypt the OS disk - and this is where the temp/cache
stuff goes.
Not always - certainly, windows cache goes to a partition that must be
available at windows
Jim Choate wrote:
Yes, it can mount the partition. That isn't the problem. The problem
is that for lilo to do this it has to have access to the key in
plaintext. That makes the entire exercise moot.
not if you have to type it every time.
if you take that as criteria, then *all* encryption is
[EMAIL PROTECTED] wrote:
Once the war is over senior people in the U.S. administration better
have proof acceptable to the international community in open forums if
they do not wish to share a similar fate as their Iraqi counterparts.
I think the US believe that, with the USSR gone, they are
Morlock Elloi wrote:
Ever tried to install a ssh client on a random internet cafe computer
Yup.
1. download putty
2. run putty
3. run batchfile that changes password to next oneshot
4. do whatever is needed
5. exit putty
:)
Neil Johnson wrote:
- Most important, using Biological or Chemical Weapons is a two-edged
sword. They could do just as much damage to their own troops as to
the US and UK troops if they make a mistake.
Might be interesting to see what would happen if iran felt threatened by
bush's aggressive
1. How do you create a X.509 signing hierarchy?
by issuing other people's keys with a subordinate CA certificate.?
http://yro.slashdot.org/yro/02/05/30/1640210.shtml?tid=111
It was a combo bill - the Spammers have to restrict themselves to
Opt-In, but the Governments get to demand ISPs keep records of who does
what where on demand. Of course, none of this has legal force until
ratified in the countries own
Phil Youngblood posted the following to the securecomp server - thought
it might interest people here, given the recent discussion of M$'s DRM
stuff...
--
This from the Eula for the latest Windows Media Player patch.
* Digital Rights Management
Kevin Elliott wrote:
The point is though, that according to C99 today
volatile int myflag;
myflag=0;
if (myflag!=0) { do stuff } ;
does _exactly_ what you want, per the spec. The only compilers that
don't work this way are by definition out of spec, so adding new
stuff isn't going to
David Honig wrote:
I was thinking more in terms of arrays
memset( arr, 0, sizeof(arr)) // zero
unsigned int v=1;
for (int i=0; i arr_size; i++) v += arr[i]; // check
if ( v0 v2 ) // test
sanity();
else
insanity();
But I suppose that if compilers can be arbitrarily 'clever'
(eg about
Bill Frantz wrote:
There is a common example of this corner case where the memory is
paged. The page containing the key is swapped out, then it is read
back in and the key is overwritten, and then the page is deallocated.
Many OSs will not zero the disk copy of the key.
Given the nature of
Jeroen C. van Gelderen wrote:
The last, I think, is the right answer. On the whole, when my laptop
is stolen I don't want anybody to get *anything* useful off of that
drive. If they can't get anything useful, then in particular they
cannot get my crypto keys and I'm done.
Law enforcement can
Eugen Leitl wrote:
On Sat, 30 Nov 2002, Dave Howe wrote:
I believe I mentioned geographic routing (which is actually
switching, and not routing) so your packets get delivered, as the
crow flies. The question of name services. How often do you actually
use a domain name as an end user
Jim Choate wrote:
http://www.newscientist.com/news/news.jsp?id=ns3180
yeah. downloaded that (its about 300MB!) and after going though the setup it
doesn't like my video card *sigh*
At first look though, it would appear the system is set up for a decent
proportion of the money to flow in the
Jim Choate wrote:
On Wed, 11 Dec 2002, Steve Schear wrote:
From the article:
The court dismissed suggestions the Internet was different from
other broadcasters, who could decide how far their signal was to be
transmitted.
This is totally bogus thinking. The Internet is not broadcast medium.
Ben Laurie wrote:
|| Errr - its tricky anyway, coz the cert has to match the final
|| destination, and, by definition almost, that can't be the proxy.
provided you can impose a CA cert onto the user browser (not hard in a
corporate environment) it isn't as if signing a certificate on the fly
is
James A. Donald wrote:
And PGP tells me signature not checked, key does not meet
validity threshold
what version are you on? ckt never does that - it checks it, and marks the
sig status as good or bad - but obviously marks the key status as invalid
(due to lack of signing) on anyone I don't
Tim May wrote:
Reading about the Romanian student arrested today for allegedly
releasing one of the Blaster variants, I was struck by how easy it
would be to bring a shitstorm down on someone by inserting comments
into the virus code.
oh joy - yet another way to joe-job someone.
James A. Donald wrote:
Could you point me somewhere that illustates server issued
certs, certification with zero administrator overhead and small
end user overhead?
Been a while since I played with it, but IIRC OpenCA (www.openca.org) is a
full implimentation of a CA, in perl cgi, with no admin
James A. Donald wrote:
Attached is a spam mail that constitutes an attack on paypal similar
in effect and method to man in the middle.
The bottom line is that https just is not working. Its broken.
HTTPS works just fine.
The problem is - people are broken.
At the very least, verisign should
James A. Donald wrote:
How many attacks have there been based on automatic trust of
verisign's feckless ID checking? Not many, possibly none.
I imagine if there exists a https://www.go1d.com/ site for purposes of
fraud, it won't be using a self-signed cert. Of course it is possible that
the
Anonymous wrote:
Under the Hatch Doctrine, the computer that serves his web site
at www.senate.gov/~hatch/, is a target for elimination. It appears
that the Honorable Senator was using JavaScript code in violation
of the license:
http://www.wired.com/news/politics/0,1283,59305,00.html
Sic
John Kozubik wrote:
On Mon, 21 Jul 2003, Major Variola (ret) wrote:
Where do these ridiculous ideas come from ? If I own a piece of
private property, like an airplane (or an entire airline) for
instance, I can impose whatever senseless and arbitrary conditions
on your use of it as I please.
Eric Cordian wrote:
Now that the new standard for pre-emptive war is to murder the
legitimate leader of another sovereign nation and his entire family,
an artist's rendering of Shrub reaping what he sows would surely be
an excellent political statement.
I am not sure these two were murdered as
Tim May wrote:
On Thursday, November 6, 2003, at 09:20 AM, Dave Howe wrote:
No Such Agency doesn't fab much of anything; they can't afford to.
They and their ilk are far more interested in things like FPGAs and
adapting numerical algorithms to COTS SIMD hardware, such as graphics
processors
Students of UK politics should be aware that the british prime minister
considered it a sign of moral courage to press ahead with an attack on
iraq despite protests in the streets and massed opposition by politicians
of all parties, and that forging evidence is fully justified by the
results.
Sunder wrote:
Which only works on win9x, and no freeware updates exist for
Win2k/XP/NT. i.e. worthless...
There was a payware (but disclosed source) update for NT/2K, and of course
E4M (on which the NT driver for scramdisk was based) was always NT
compatable and very similar to Scramdisk. I
Steve Schear wrote:
If and when this is accomplished the source could then be used, if it
can't already, for PC-PC secure communications. A practical
replacement for SpeakFreely may be at hand. The limitation of either
direct phone or ISDN connection requirement is a problem though.
*nods*
Steve Schear wrote:
No, but this may be of interest.
http://www.technologyreview.com/articles/wo_hellweg111903.asp
Its closed source but claims to use AES.
*nods*
closed source, proprietory protocol, as opposed to SIP which is an RFC
standard (and interestingly, is supported natively by WinXP)
Neil Johnson wrote:
On Wednesday 19 November 2003 05:33 pm, Dave Howe wrote:
SIP is just the part of the VoIP protocols that handling signaling
(off-hook, dialing digits, ringing the phone, etc.). The voice data
is handled by Real-Time Streaming Protocol (RTSP), one stream for
each direction
Tim May wrote:
Without the ability to (untraceably, unlinkably, of course) verify
that this vote is in the vote total, and that no votes other than
those
who actually voted, are in the vote total, this is all meaningless.
The missing step is that that paper receipt isn't kept by the voter -
Miles Fidelman wrote:
- option for a quick and dirty recount by feeding the ballots through
a different counting machine (maybe with different software, from a
different vendor)
or indeed constructing said machines so they *assume* they will be feeding
another machine in a chain (so every party
Jim Dixon wrote:
The Geneva conventions require, among other things, that soldiers wear
uniforms.
No, they don't.
Fox news repeats this enough that more than half of america believes it,
but then, more than half of america believes Iraq was somehow involved in
the Trade Center attacks
[EMAIL PROTECTED] wrote:
http://www.topsecretcrypto.com/
Snake oil?
I am not entirely sure.
on the plus side - it apparently uses Sha-1 for a signing algo, RSA with a
max keysize of 16Kbits (overkill, but better than enforcing something
stupidly small), built in NTP synch for timestamps
Would something like this go over in the US? I wonder ...
I thought that there was already a levy on blank CDR media in the US;
there is certainly already one on blank audio tapes...
Bah, I really miss the crap-filtered version of cypherpunks
can anyone recommend a better node than the one I am using now?
Tyler Durden wrote:
Encryption ain't the half of it. Really good liottle article. And I
didin't know Skype was based in Luxemborg
http://slate.msn.com/id/2095777/
Not playing with Skype - why risk a closed source propriatory solution
when there is open source, RFC documented SIP?
Riad S. Wahby wrote:
John Young [EMAIL PROTECTED] wrote:
Despite the long-lived argument that public review of crypto assures
its reliability, no national infosec agency -- in any country
worldwide -- follows that practice for the most secure systems.
NSA's support for
AES notwithstanding,
Interesting looking case coming up soon - an employee (whose motives are
probably dubious, but still :) installed a keyghost onto his boss' pc and
was charged with unauthorised wire tapping.
That isn't the interesting bit. the interesting bit is this is IIRC exactly
how the FBI obtained Scarfo's
[EMAIL PROTECTED] wrote:
If you're not the driver and you don't drive you don't have to have
an ID. And you can't show what you don't have.
IIRC, in the case above the guy was outside his car - his daughter (still
in the car) may well have been the driver, not him
Riad S. Wahby wrote:
SAN FRANCISCO (Reuters) - A California state senator on Monday said
she was drafting legislation to block Google Inc.'s free e-mail
service Gmail because it would place advertising in personal
messages after searching them for key words.
Is she planning to block all the
Eugen Leitl wrote:
On Thu, Apr 22, 2004 at 01:13:48AM +0100, Dave Howe wrote:
No, it is a terrible situation.
It establishes a legal requirement that communications *not* be
private from the feds. from there, it is just a small step to
defining encryption as a deliberate attempt to circumvent
R. A. Hettinga wrote:
At 12:09 PM +0200 4/22/04, Eugen Leitl wrote:
Are you truly expecting a worldwide ban on encryption?
It's like expecting a worldwide ban on finance. Been tried. Doesn't
work.
There isn't a worldwide ban on breaking CSS - doesn't stop the film
industry trying to enforce it
Tyler Durden wrote:
HANOVER, Germany -- German police have arrested an 18-year-old man
suspected of creating the Sasser computer worm, believed to be one of
the Internet's most costly outbreaks of sabotage.
Note the language...an 18 year old MAN and sabotage...
So a HS kid, living with his
opinions?
http://www.wisdom.weizmann.ac.il/~tromer/acoustic/
Eric Cordian wrote:
I have a dual boot system which normally runs Linux. Since it had
been a couple of months since I last ran XP, I booted it on Tuesday
to run Windows Update, and keep it current with critical patches.
Within minutes, before I had even downloaded the first update, my box
Eric Cordian wrote:
But Nigeria is a very poor country, with high unemployment, where
people are forced by economic circumstances to do almost anything to
try and feed their families. I see no reason to be proud of
reverse-scamming a Nigerian out of $80 when it might be his entire
family's
Thomas Shaddack wrote:
The easiest way is probably a hybrid of telephone/modem, doing normal
calls in analog voice mode and secure calls in digital modem-to-modem
connection. The digital layer may be done best over IP protocol, assigning
IP addresses to the phones and making them talk over TCP
Jack Lloyd wrote:
How well is VoIP going to work over SSL/TLS (ie, TCP) though?
you can do SSL over UDP if you like - I think most VPN software is UDP
only, while OpenVPN has a fallback TCP mode for cases where you can't
use UDP (and TBH there aren't many)
I've never used
any VoIP-over-TCP
Particularly disgusted by the last paragraph
|http://www.visual-mp3.com/review/14986.html
|
| X-Cipher - Secure Encrypted Communications
|
|The Internet is a wonderful shared transmission technology, allowing
|any one part of the Internet to communicate to any other part of the
|Internet. Like
Morlock Elloi wrote:
Hint: all major cryptanalytic advances, where governments broke a cypher and
general public found out few *decades* later were not of brute-force kind.
all generalizations are false, including this one.
most of the WWII advances in computing were to brute-force code engines,
Pete Capelli wrote:
On Thu, 05 Aug 2004 20:07:23 +0100, Dave Howe [EMAIL PROTECTED] wrote:
all generalizations are false, including this one.
Is this self-referential?
yes - some generalizations are accurate - and its also a quote, but I
may have misworded it so I didn't quotemark it or supply
J.A. Terranson wrote:
Which of course neatly sidesteps the issue that a DRIVERS LICENSE is
not identification, it is proof you have some minimum competency to
operate a motor vehicle...
IIRC, several states have taken to issuing a no compentency driving
licence (ie, the area that says what that
Riad S. Wahby wrote:
...except (ta-d) the passport, which is universally accepted by
liquor stores AFAICT.
And how many americans have a passport,and carry one for identification
purposes?
Damian Gerow wrote:
I've had more than one comment about my ID photos that amount to basically:
You look like you've just left a terrorist training camp. For whatever
reason, pictures of me always come out looking like some crazed religious
fanatic. But that doesn't mean that I'm going to bomb
Major Variola (ret) wrote:
t 11:22 PM 10/1/04 -0700, Bill Stewart wrote:
In the US its generally illegal to tattoo someone who is drunk.
Not sure about that - certainly its illegal in the UK to tattoo for a
number of reasons, but the drunkenness one usually comes down to is not
capable of giving
Major Variola (ret) wrote:
There is a bill in this year's Ca election to require DNA sampling of
anyone arrested. Not convicted of a felony, but arrested.
Doesn't surprise me - the UK police collected a huge bunch of
fingerprints and dna samples for elimination purposes during one of
the
Tyler Durden wrote:
Oops. You're right. It's been a while. Both photons are not utilized,
but there's a Private channel and a public channel. As for MITM attacks,
however, it seems I was right more or less by accident, and the
collapsed ring configuration seen in many tightly packed metro areas
Steve Furlong wrote:
On Thu, 2004-10-07 at 14:50, Dave Howe wrote:
The regular encryption scheme (last I looked at a QKE product) was XOR
Well, if it's good enough for Microsoft, it's good enough for everyone.
I have it on good authority that Microsoft's designers and programmers
are second
R. A. Hettinga wrote:
Two factors have made this possible: the
vast stretches of optical fiber (lit and dark) laid in metropolitan areas,
which very conveniently was laid from one of your customers to another
of your customers (not between telcos?) - or are they talking only
having to lay new
walking distance, sending high volumes of
extremely sensitive material between them)
-TD
From: Dave Howe [EMAIL PROTECTED]
To: Email List: Cryptography [EMAIL PROTECTED],
Email List: Cypherpunks [EMAIL PROTECTED]
Subject: Re: QC Hype Watch: Quantum cryptography gets practical
Date: Tue
Dave Howe wrote:
I think this is part of the
purpose behind the following paper:
http://eprint.iacr.org/2004/229.pdf
which I am currently trying to understand and failing miserably at *sigh*
Nope, finally strugged to the end to find a section pointing out that it
does *not* prevent mitm attacks
R.A. Hettinga wrote:
The technology at the core of Certicom's products - elliptic-curve
cryptography, or ECC - is well suited to such purposes since it can work
faster and requires less computing power and storage than conventional
forms of cryptography, he said.
Well, best of luck to them. any
Tyler Durden wrote:
So. Why don't we see terrorist attacks in Sweden, or Switzerland, or
Belgium or any other country that doesn't have any military or
Imperliast presence in the middle east? Is this merely a coincidence?
What I strongly suspect is that if we were not dickin' around over there
Adam wrote:
You know, the more I read posts by Mr. Donald, the more I believe that
he is quite possibly the most apt troll I have ever encountered. It is
quite apparent from reading his responses that he is obviously an
exceptionally intelligent (academically anyway) individual. I find it
hard to
Tyler Durden wrote:
I'm sure there are several Cypherpunks who would be very quick to
describe Kerry as needs killing.
but presumably, lower down the list than shrub and his current advisors?
R.A. Hettinga wrote:
The stored software will serve as a comparison tool for election officials
should they need to determine whether anyone tampered with programs
installed on voting equipment.
IIRC during the last set, the manufacturers themselves updated
freshly-minted software from their ftp
Tyler Durden wrote:
Yet what of your blindness, which doubts *everything* the current
administration does?
1. Abu Ghraib
2. WMD in Iraq
3. Patriot Act
4. Countless ties between this administration and the major contract
winners in Iraq
Hum. Seems a decent amount of doubt is called for.
For that
Roy M. Silvernail wrote:
I'd thought it was so Microsoft could offer an emulation-based migration
path to all the apps that would be broken by Longhorn. MS has since
backed off on the new filesystem proposal that would have been the
biggest source of breakage (if rumors of a single-rooted, more
[EMAIL PROTECTED] wrote:
This is what I love about the Internet -- ask a question
and get silence but make a false claim and you get all the
advice you can possibly eat.
Yup. give wrong advice, and you look like a fool. correct someone
else's wrong advice, and you make them look foolish (unless
Ian Grigg wrote:
It's actually quite an amusing problem. When put
in those terms, it might be cheaper and more secure
to go find some druggie down back of central station,
and pay them a tenner to write out the ransom demand.
Or buy a newspaper and start cutting and pasting the
letters...
or
Roy M. Silvernail wrote:
I was thinking more of the rumor that Longhorn's filesystem would
start at '/', removing the 'X:' and the concept of separate drives
(like unix has done for decades :) ). When I first saw this
discussed, the consensus was that it would break any application that
expected
Joseph Ashwood wrote:
I believe you are incorrect in this statement. It is a matter of public
record that RSA Security's DES Challenge II was broken in 72 hours by
$250,000 worth of semi-custom machine, for the sake of solidity let's
assume they used 2^55 work to break it. Now moving to a
Joseph Ashwood wrote:
I believe you substantially misunderstood my statements, 2^69 work is
doable _now_. 2^55 work was performed in 72 hours in 1998, scaling
forward the 7 years to the present (and hence through known data) leads
to a situation where the 2^69 work is achievable today in a
Eugen Leitl wrote:
On Sat, Feb 19, 2005 at 03:53:53PM +, Dave Howe wrote:
I wasn't aware that FPGA technology had improved that much if any - feel
free to correct my misapprehension in that area though :)
FPGAs are too slow (and too expensive), if you want lots of SHA-1
performance,
use
Eugen Leitl wrote:
http://wired.com/news/print/0,1294,68306,00.html
Privacy Guru Locks Down VOIP
By Kim Zetter
Story location: http://www.wired.com/news/technology/0,1282,68306,00.html
10:20 AM Jul. 26, 2005 PT
First there was PGP e-mail. Then there was PGPfone for modems. Now Phil
Hasan Diwan wrote:
if the US wants to maintain its fantasy, it will need a Ministry of Truth to
do so. Cheers, Hasan Diwan [EMAIL PROTECTED]
And the airing of government-issued news bulletins without attributation (or
indeed, anything from Fox News) doesn't convince you there already is one?
Tyler Durden wrote:
Hey...this looks interesting. I'd like to see the email chain before this.
sorry, accidental crosspost from mailto:cryptography@metzdowd.com; see
http://diswww.mit.edu/bloom-picayune/crypto/18225 for the post it is a reply to.
Tyler Durden wrote:
We need a WiFi VoIP over Tor app pronto! Let 'em CALEA -that-. Only then
will the ghost of Tim May rest in piece.
Don't really need one. the Skype concept of supernodes - users that relay
conversations for other users - could be used just as simply, and is
Gil Hamilton wrote:
The problem is that reporters want to be made into a special class of
people that don't have to abide by the same laws as the rest of us. Are
you a reporter? Am I? Is the National Inquirer? How about Drudge?
What about bloggers? Which agency will you have to apply to
Gil Hamilton wrote:
I've never heard it disclosed how the prosecutor discovered that Miller had
had such a conversation but it isn't relevant anyway. The question is, can
she defy a subpoena based on membership in the privileged Reporter class that
an ordinary person could not defy?
Why not?
Phil Youngblood posted the following to the securecomp server - thought
it might interest people here, given the recent discussion of M$'s DRM
stuff...
--
This from the Eula for the latest Windows Media Player patch.
* Digital Rights Management
Ben Laurie wrote:
|| Errr - its tricky anyway, coz the cert has to match the final
|| destination, and, by definition almost, that can't be the proxy.
provided you can impose a CA cert onto the user browser (not hard in a
corporate environment) it isn't as if signing a certificate on the fly
is
Kevin Elliott wrote:
The point is though, that according to C99 today
volatile int myflag;
myflag=0;
if (myflag!=0) { do stuff } ;
does _exactly_ what you want, per the spec. The only compilers that
don't work this way are by definition out of spec, so adding new
stuff isn't going to
Jeroen C. van Gelderen wrote:
The last, I think, is the right answer. On the whole, when my laptop
is stolen I don't want anybody to get *anything* useful off of that
drive. If they can't get anything useful, then in particular they
cannot get my crypto keys and I'm done.
Law enforcement can
http://www.cnn.com/2002/TECH/11/21/yourtech.wifis/index.html
Its a nice idea, but unfortunately gets easily bitten by the usual
networking bugbears
1. large wifi networks start to hit scaling problems - they start to need
routers and name services that are relatively expensive, and ip address
Jim Choate wrote:
On Sat, 30 Nov 2002, Dave Howe wrote:
The scaling problem is a valid one up to a point. The others are not.
The biggest problem is people trying to do distributed computing using
non-distributed os'es (eg *nix clones and Microsloth).
not as such, no. the vast majority of free
Eugen Leitl wrote:
On Sat, 30 Nov 2002, Morlock Elloi wrote:
1. large wifi networks start to hit scaling problems - they start
to need routers and name services that are relatively expensive,
and ip address
Geographic routing completely eliminates need for expensive routing
and admin
Morlock Elloi wrote:
Not so. Self-organasing mesh networks appear to have some interesting
properties. There is a number of open solutions and at least one
startup I know about based on this.
snip links
fascinating - I obviously have a lot of reading to do - thankyou :)
Eugen Leitl wrote:
On Sat, 30 Nov 2002, Dave Howe wrote:
I believe I mentioned geographic routing (which is actually
switching, and not routing) so your packets get delivered, as the
crow flies. The question of name services. How often do you actually
use a domain name as an end user
Tim May wrote:
Many of us have at least two phone numbers: one that is widely
accessible, published even. Another that is private, often a
cellphone. In my 6 years of using a cellphone, whose number I do not
give out to many, I have only gotten two spam calls that I know of:
both were from a
Jim Choate wrote:
http://www.newscientist.com/news/news.jsp?id=ns3180
yeah. downloaded that (its about 300MB!) and after going though the setup it
doesn't like my video card *sigh*
At first look though, it would appear the system is set up for a decent
proportion of the money to flow in the
Jim Choate wrote:
On Wed, 11 Dec 2002, Steve Schear wrote:
From the article:
The court dismissed suggestions the Internet was different from
other broadcasters, who could decide how far their signal was to be
transmitted.
This is totally bogus thinking. The Internet is not broadcast medium.
I have seen this *five* times already - is there some sort of wierd mailing
loop in action?
I am fairly certain I haven't sent it five times spread out over two
days
Sunder wrote:
Let's see, we're going into war with Iraq, and we're sending up the
shuttle to do experiments on how furry weavols behave under zero
gravity... uh huh.
Lothe though I am to shed doubt on your consipiracy theories - but the
shuttle was on its way *down*. Why would they be bringing
David Howe wrote:
at Thursday, February 06, 2003 4:48 PM, Chris Ball
[EMAIL PROTECTED] was seen to say:
Another point is that ``normal'' constables aren't able to action the
request; they have to be approved by the Chief Constable of a police
force, or the head of a relevant Government
Jim Choate wrote:
Yes, it can mount the partition. That isn't the problem. The problem
is that for lilo to do this it has to have access to the key in
plaintext. That makes the entire exercise moot.
not if you have to type it every time.
if you take that as criteria, then *all* encryption is
Jim Choate wrote:
On Sat, 8 Feb 2003, Sunder wrote:
In real life this will not work as most Windoze hard disk encryption
schemes can't encrypt the OS disk - and this is where the temp/cache
stuff goes.
Not always - certainly, windows cache goes to a partition that must be
available at windows
Jim Choate wrote:
On Sun, 9 Feb 2003, Dave Howe wrote:
Jim Choate wrote:
Yes, it can mount the partition. That isn't the problem. The problem
is that for lilo to do this it has to have access to the key in
plaintext. That makes the entire exercise moot.
not if you have to type it every time
1 - 100 of 175 matches
Mail list logo