David Chessler
At 09:49 PM 2/9/2008, Tony B wrote:
I'm not sure I believe this. Once it's been determined
you've used TC, wouldn't there then be an assumption
the outer container was just anouter container?
I mean, a robber's purse is not a new concept.
Check the documentation. The source code
Can the data which is encrypted/hidden by truecrypt be backed up by an
ordinary backup program that catalogs the files on the source and backup
drives, and copies new/newer files to the backup drive? Is there special
backup software provided to accomplish backups?
Fred Holmes
At 07:30 AM
All data is just zeros and ones...so yes.
MIke
On Feb 10, 2008 12:36 PM, Fred Holmes [EMAIL PROTECTED] wrote:
Can the data which is encrypted/hidden by truecrypt be backed up by an
ordinary backup program that catalogs the files on the source and backup
drives, and copies new/newer files to
Constance,
I have worked with Excel for two decades, and I can tell you that it
will easily handle 5000 records on a STABLE machine. But I don't think
the conversion is a good idea because of experiences I have had with
'systems' built on top of Excel Spreadsheets, Access DB, and MS Word.
You read my mind. Your description of the travails
of tech people trying to get citizenship made me
think why would the US let people when we have
indentured servitude (i.e., the H1 visa program).
In the past, H-1 was a potentially a threat to my livliehood
and then I worked with H1 visa guys and
Want to see what happens when MS tries to copy the iPhone...
www.sonyericsson.com/x1
The Zune of cell phones.
* == QUICK LIST-COMMAND REFERENCE - Put the following commands in ==
* == the body of an email send 'em to:
At 02:36 PM 2/10/2008, Fred Holmes wrote:
Can the data which is encrypted/hidden by truecrypt be backed up by
an ordinary backup program that catalogs the files on the source
and backup drives, and copies new/newer files to the backup
drive? Is there special backup software provided to