Well I don't use EFS allone either! I am sure that nobody on this forum does... On the other hand, EFS if used correctly can be extremely useful....
I have never heard of such a magic tool, which in fact I believe DOES NOT exist. Cause if you reset the password, you won't be able to access the...
Mmmh... "if you have a 25char alpha/num/symb password on a local user account" which is not banally guessable, it won't get bruteforced in a...
Thanks Steve :) On the other hand, Steve, I believe that Xerobank would be willing to cooperate with LEO when investigating crimes against the...
Well, by "password protected NTFS File System" I mean file system encrypted with EFS... otherwise the question would be... meaningless. So,...
Oh yeah, because you are sure that Xerobank, to name one with a good reputation, can't easily log any kind of traffic on their network? You sound...
Encryption is the only way you can't prevent unauthorized access to data on a removable drive.
If all you want to achieve is keep your private data... private, I reccomend creating a TrueCrypt volume on your USB, and choose strong password...
This would be interesting to do for anybody with about 1500$ to spend on research. If you try it, let us know the results. Anyways, I agree with...
For what I remember, JAP does have a function that allows the logging of traffic for specific users, but it is usually disabled. When one (or...
On the other hand, very few AV won't recognize an executable infected by Perfect Keylogger.
What do you mean by "locking"? What are you trying to achieve?
Funny :)
Actually, while I somehow believe that Xerobank can give you a fair anonimity, I have many questions on their mail service (which I don't use a...
Where did you read this "up to 10 hours"? Browsing the princeton details on this attack, I remember the time for the attack was around 10 minutes,...
I remember of some easy hardware attacks on the ikey... but I am not sure on what model and I know it is something aged... so it might not be true...
Erased free space is noise, true, as a totally encrypted partition is noise. A file which contains only random data looks suspicious to any...
Please, if anybody finds somebody ale to recover data that has been overwritten once, please let me know. Cause I am sure nobody will find one.
Dear Magenta, technically speaking, the use of encrypted email is extremely simple and userfriendly. If you are interested in it, I would advise...
Well yes, if you "full encrypt" your system, all your data will be overwritten with data that, without decryption key, looks exactly like random...
Of course, testing and trying and playing with devices is definitely the best way to learn, in my opinion. Also, reading carefully user manuals...
I am not here to defend nor support Steve Topletz, but I know that he is quite a good reputation in IT Security; he is the author of TorPark and...
Berlusconi is doing an extremely good job at bringing back fascism. And Italians are helping a lot. I already know there will be no protest for...
I would like to post this article (in Italian) in which a new Bill is discussed. If approved, such bill could heavily limit the freedom of speech...
How about if the software keylogger you are trying to fool takes a screenshot every time you click with your mouse? At some point, it will have...
Separate names with a comma.