Re: key question

2010-03-06 Thread Paul Richard Ramer
On Sat, 27 Feb 2010 03:52:02 + MFPA wrote: (b) the person owns the information has the right to control how it is disseminated, and The data subject does have various rights concerning the personal information that is about him. Hello MFPA, How far do the rights of the key holder go?

Re: key question

2010-03-06 Thread Paul Richard Ramer
Hello MFPA, During this whole debate, you have assumed one thing in your argument that I don't believe anyone has pointed out as being flawed. You have assumed that the person (I will call him John Doe) would have decided to create a UID that contained the personal information that he wants to

Re: Memory forensics

2010-03-06 Thread Grant Olson
On 3/6/2010 2:02 AM, Robert J. Hansen wrote: Thanks a million for all this. The company Volatile Systems was really messing with my google-fu. Err -- why? Volatile Systems is behind the Volatility framework, which is probably the best FOSS tool going right now for Windows memory