Due to major operating system problems I am accessing the web using a live pendrive. The problem is that the pendrive OS and browser are years...
Thank you for your support. Asking others for their experiences is always worthwhile. I obtained the software package (32 bit, free version) from...
master-pdf-editor-3.5.81_i386.deb I would like to install the 32 bit free version of the above programme under kubuntu. I have no reason to...
Hi, I note that Protonmail is encrypted, but I don't think it is anonymous. Hence anyone could send spam to the address. Can this be avoided?...
Are the 100 numbers placed on the card prior to the Pinsentry being issued, or only after. If after, then I assume that the card will need to be...
Card holders decide their own PIN number
I have read the links. I am still a little confused. Am I right in thinking that the Pinsentry number generated is a hash of all my card details...
Thank you. I will read the links. Best wishes.
I f I use Pinsentry evidently I can get a code from the card reader and type it into the banking page and gain access. My question is: How does...
I expect there are electronic devices that could easily break PINs. Do you know if Barclays charge for supplying the PINsentry devices?
Hi, Has anyone found a free anonymous web mailer that works? Thanks
Can fraudsters not break PIN's? I use Linux which I believe the be safer since trojans tend to be designed to attack Windows systems
I will be using Barclays online banking (UK). They use a device called PINsentry. Suppose my card is stolen, or, somehow, my card is cloned. Can...
Thanks for responding. I am a little confused when you talk of tar files. In my example: gpg --verify file.tar.xz.asc file.tar.xz, both files...
if I use gpg to check the validity of a file, say file.tar.xz using a file.tar.xz.asc (downloaded to the pc), ie gpg --verify file.tar.xz.asc...
I obtained my TC programme from Steve Gibson's site, and where the Hash files are kept on Taylor Hornby's site. I believe that these sites offer a...
Hi, I note that many here use Truecrypt. I expect you all know that there is a debate surrounding Truecrypt and its security since development...
Since the file sizes are quite large I suppose that people using a text editor would check say the first few lines, and perhaps the last few.
Thank you Out of interest, you said previously that it is a good idea to compare keys for consistency. Can they be compared using gpg?
Thank you for responding. Some of the keys are in my Download folder. I would like to make a key folder and store the keys. If I move the keys...
If I download a key and then import it into gpg do I have to keep the downloaded key file (in Downloads:Kubuntu), or can I delete it from the...
Thank you for responding. 'I have downloaded a programme from a website and the page talks of using keys to validate the program. Second point....
Hi, I use Kubuntu and have gpg installed as a default program. First point. What is the difference between pgp and gpg? I have downloaded a...
Thanks to all for the responses. I will not be using Tor to login to my account. Best wishes. A
Hi, I can use FF inside Tor, or not. For internet banking is using Tor a good idea, or not really necessary? Thanks
Separate names with a comma.