On Sat, 27 Feb 2010 03:52:02 + MFPA wrote:
(b) the person owns the information has the right to
control how it is disseminated, and
The data subject does have various rights concerning the personal
information that is about him.
Hello MFPA,
How far do the rights of the key holder go?
Hello MFPA,
During this whole debate, you have assumed one thing in your argument
that I don't believe anyone has pointed out as being flawed. You have
assumed that the person (I will call him John Doe) would have decided
to create a UID that contained the personal information that he wants
to
On 3/6/2010 2:02 AM, Robert J. Hansen wrote:
Thanks a million for all this. The company Volatile Systems was
really messing with my google-fu.
Err -- why?
Volatile Systems is behind the Volatility framework, which is probably
the best FOSS tool going right now for Windows memory