-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Laurent Jumet wrote:
Hello Smith, !
Smith, Cathy cathy.sm...@pnl.gov wrote:
I've tried using the --yes option without success to suppress this
interactive prompt doesn't pop up. This encryption does need to run in a
batch job. What do I
On Mar 5, 2010, at 7:39 AM, John W. Moore III wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Laurent Jumet wrote:
Hello Smith, !
Smith, Cathy cathy.sm...@pnl.gov wrote:
I've tried using the --yes option without success to suppress this
interactive prompt doesn't pop up.
On 03/05/2010 01:30 AM, Smith, Cathy wrote:
The gpg --list-sig shows that the keys are signed. Do I need to create a
new signature key, and re-sign all the public keys that I imported?
I think the simplest thing for you to do is to modify the ownertrust of
your old signing key on the new
On Thu, Mar 04, 2010 at 06:13:17PM -0500, David Shaw wrote:
On Mar 4, 2010, at 4:34 PM, Nicolas Boullis wrote:
Reading RFC 4880 (OpenPGP standard), if I am able to decrypt the session
key, it should be possible to create a new Public-Key Encrypted Session
Key packet to allow a new key
On 3/5/10 9:51 AM, Nicolas Boullis wrote:
I will now have a look at how things are organised in GnuPG code.
Would you suggest that I look at the GnuPG 1 or GnuPG 2 code?
If memory serves, the codebases are identical with respect to this.
Shouldn't matter which one you use.
And if I succeed to
On Mar 5, 2010, at 9:51 AM, Nicolas Boullis wrote:
On Thu, Mar 04, 2010 at 06:13:17PM -0500, David Shaw wrote:
On Mar 4, 2010, at 4:34 PM, Nicolas Boullis wrote:
Reading RFC 4880 (OpenPGP standard), if I am able to decrypt the session
key, it should be possible to create a new Public-Key
Folks
Thanks for your suggestions. They worked.
Regards,
Cathy
---
Cathy L. Smith
IT Engineer
Pacific Northwest National Laboratory
Phone: 509.375.2687
Fax: 509.375.2330
Email: cathy.sm...@pnl.gov
-Original Message-
From: gnupg-users-boun...@gnupg.org
Daniel Kahn Gillmor wrote:
On 03/05/2010 01:30 AM, Smith, Cathy wrote:
The gpg --list-sig shows that the keys are signed. Do I need to create a
new signature key, and re-sign all the public keys that I imported?
I think the simplest thing for you to do is to modify the ownertrust of
your
http://jessekornblum.livejournal.com/259124.html
For quite some time we've known that hibernation files present risks for
information security. However, there are always those who say until I
see an actual demonstration, I won't believe it.
The upshot: we now have an actual demonstration. The
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Robert J. Hansen wrote:
http://jessekornblum.livejournal.com/259124.html
For quite some time we've known that hibernation files present risks for
information security. However, there are always those who say until I
see an actual
On 3/5/2010 4:30 PM, Robert J. Hansen wrote:
http://jessekornblum.livejournal.com/259124.html
For quite some time we've known that hibernation files present risks for
information security. However, there are always those who say until I
see an actual demonstration, I won't believe it.
On 3/5/10 5:04 PM, Grant Olson wrote:
That article was a little vague. And I don't know much about memory
forensics in practice. Do you know that it actually was a hibernation
file and not swap space?
Note Jesse's phrasing: volatile memory forensics. Swap space is
nonvolatile storage.
On 03/05/2010 05:18 PM, Robert J. Hansen wrote:
On 3/5/10 5:04 PM, Grant Olson wrote:
That article was a little vague. And I don't know much about memory
forensics in practice. Do you know that it actually was a hibernation
file and not swap space?
Note Jesse's phrasing: volatile memory
Thanks a million for all this. The company Volatile Systems was
really messing with my google-fu.
Err -- why?
Volatile Systems is behind the Volatility framework, which is probably the best
FOSS tool going right now for Windows memory analysis. (Admittedly, it only
works on Windows XP...
14 matches
Mail list logo