I'm interested to see how Open Office v3 does. It's currently in Beta 2.... Might be worth some bugs to try it out.
The simplest hardware fix for the cold boot attack (which is old news anymore) would be to modify the chipsets to upon shutdown, initiate a...
You have a Manufacturer and Model Number in your BIOS? Usually you just have drive geometry. Since this is a laptop, and with that tidbit of...
The only country that I'm aware of is the United Kingdom. You can't be compelled in the USA (Fifth Amendment). Where else can you be compelled?
Right. They won't even be able to see the files. The computer that it is installed into (assuming its slaved) will just show up to windows as...
I had a similar problem a couple of months ago with Comcast. I'd be fine, then out of nowhere I'd suffer a 2-4 minute connection drop (modem...
OpenOffice User here. Its been a long time since MS Office was sold as components... I have a Word 6.0 box somewhere....
From the TC Docs: The page your quoting from, is the Known Issues and is not referring to a vulnerability in data being left in the swap file...
This is the stupidest thing I've heard yet.. If your adversary can get to your system when its already been booted, you've already lost the...
Lets break this down a bit since its a long post with a few questions. I use TrueCrypt (love it). All you need is a program that does On The...
I can't help it, I'm a fan of "Occam's razor," which basically says that the simplest answer is probably the right answer. While its nice to...
Actually, you have it backwards. The pagefile issue only affects systems that are not using system encryption, because when you do use it,...
You know, I'm going to go against the tide here and say don't delete that email address. Keep it. Why? Simple. If someone has that much...
The only time RED has crashed (or started to) was when it was trying to delete system folders. Try narrowing your scans down a little so that...
When something is rendered moot, it means that something ceases to be of consequence or doesn't matter because something else makes it so. In...
Not to mention the performance impact of having a double or triple cipher. And if AES was broken in the next few months, then the gov't has a lot...
Truth - that is a bit of a moot point, since without the bootloader, the only thing you will be able to do is restore the drive since recovery...
Actually, it was just as identifable back then depending on configuration because the DCHP server could register what login was assigned what IP....
Randomness and 64 characters is a lot less important than having a non pure alphanumeric password. IE: The odds of "Th1sPass%wordBe1ngCracked"...
Right.
My IP is relatively static.. Its officially dynamic but hasn't changed in over a year. I don't consider it personally identifiable because there...
Flame bait question. You'll get a different answer from everyone you ask. RIAA arguments depend on the concept that you can track an IP to one...
Keep in mind that MAC filtering doesn't do anything to stop people from listening to the signal, it just stops them from being able to transmit...
Interesting reading. Though I must say, I am getting curious when he says that encrypted systems in which the users won't supply a password...
No. You can move a folder into a TC container but you can't just pick a folder and encrypt it. Also you can't mount containers to a...
Separate names with a comma.