(curse you anti-gmail-top-posting zealots...)
On Wed, Sep 11, 2013 at 3:47 PM, Dave Horsfall d...@horsfall.org wrote:
Another whacky idea...
Given that there is One True Source of randomness to wit radioactive
emission, has anyone considered playing with old smoke detectors?
Yep. For fun I
On Wed, Aug 6, 2008 at 8:23 AM, Peter Saint-Andre [EMAIL PROTECTED] wrote:
Wells Fargo is requiring their online banking customers to provide answers
to security questions such as these:
It strikes me that the answers to many of these questions might be public
On Wed, Jun 4, 2008 at 12:51 PM, Perry E. Metzger [EMAIL PROTECTED] wrote:
An object lesson in this just fell in my lap -- I just got my first
email from a spammer that links to a web site that uses such a cert,
certified by a CA I've never heard of (Starfield Technologies, Inc.)
On 9/6/07, Jacob Appelbaum [EMAIL PROTECTED] wrote:
Seagate recently announced a 1TB drive for desktop systems and a 250GB
laptop drive. What's of interest is that it appears to use a system
called DriveTrust for Full Disk Encryption. It's apparently AES-128.
Yes, but will it work on my
On 1/6/07, Allen [EMAIL PROTECTED] wrote:
One of the questions that I have been raising is trust and how to
ensure that that it is not misplaced or eroded over time. Which
leads me to my question for the list: I can see easily how to do
split key for 2 out of x for key recovery, but I can't seem
On 7/4/06, Thor Lancelot Simon [EMAIL PROTECTED] wrote:
2) Hifn used to make this documentation publically available but access
to it now requires permission from Hifn sales -- it has been password
protected on their public web site. In other words, after years of
design wins based on
On 9/17/05, William Allen Simpson [EMAIL PROTECTED] wrote:
Do you really need to click on this link to know which one it is?
I guess we should give neutral facial expressions for the photo, then
smile (or frown) while in the
On 8/26/05, Steven M. Bellovin [EMAIL PROTECTED] wrote:
If you don't trust your (or your correspondents') IM servers, it may be
a different situation. I haven't read Google's privacy policies for
IM; if it's anything like gmail, they're using automated tools that
look at your messages
On 6/26/05, Dan Kaminsky [EMAIL PROTECTED] wrote:
It is not necessary though that there exists an acceptable solution that
keeps PC's with persistent stores secure. A bootable CD from a bank is
an unexpectedly compelling option, as are the sort of services we're
going to see coming out of all
On 4/8/05, James A. Donald [EMAIL PROTECTED] wrote:
Every ATA disk contains encryption firmware, though not
all bioses allow you to use it.
Not all drives contain this encryption firmware, which isn't
actually encryption firmware. It's more of a login feature. You have
to send the drive
Maybe one of these nifty looking general dynamics widgets is what you're after?
GDB has a 'break' feature; why doesn't it have 'fix' too?
says that there are. There's even a widget that supposedly runs up to
I'm enough of a freenix zealot though that I'd build one out of a
couple of opteron boxen with gig ether cards and run
On Tue, 04 Jan 2005 15:41:12 -0500, John Denker [EMAIL PROTECTED] wrote:
Udhay Shankar N wrote:
I just got a batch of spam: perfectly justified blocks of random-looking
characters. Makes me wonder if somebody is trying to train Bayesian
filters to reject PGP messages.
Or someone is trying
On Wed, 8 Dec 2004 13:33:27 +0100, Lee Parkes [EMAIL PROTECTED] wrote:
I'm working on a project for a company that involves the use of 3DES. They
asked me to find out what the overheads are for encrypting a binary file.
will be quite a lot of traffic coming in (in the region
Mail list logo