Just the name server I found was MS. Here's something else I found. It's a map and MS shows up not two, but three times. If I only knew what it...
Hm! An interesting article, indeed! Thx. It mentions the origin of the malware as 3322.org in China. So I looked it up:...
Well... The nagging feeling is still is still there, so I'm 'nagging' you all! :>) The question is the same as in post above: "Why in the...
Back to 'homebase' and took the pictures I promised you! Infected Excel: 2012.08.22...VisiVirus - Selection too large.xls Virus...
I did the looking up and I think I got it now! Thx. Q: Why in the world did Zimmermann use the cumbersome authentication network when he...
You got it! It doesn't have to be attached; it could be included. Also virtually unbreakable by virtue of the very long keys. Keys generated...
The ol' saying holds true in cryptography more than anywhere else: If you want it done right, do it yourself! I miss my old parallel printer...
I'm at a loss here because I don't know enough about digital signitures and therefore I don't fully understand what's to stop Eve from just...
Compiler/bin's? Yes, if they produce identical results. OS/vendor/hw? Yes if NOT online. You bet! So be careful! Stay offline. They all are...
I disagree! You get the source, you inspect, recompile and then -- and only then -- use! How can you be infected "in-flight"? You can still be...
Are you saying that you always recompile it? or Are you saying that source availability is a 'sign' you use in deciding whether to trust the...
...and they just MIGHT outline the consequeces of so doing! Sorry! If you were to phrase it like this "...lot's of "formers" WERE ALLOWED to...
...and here's my competition: "...designing a specific hardware security device – the MilsCard. It comprises all the sensitive system...
Will you, please, stop using the word ‘invention’ and its derivatives? I am an inventor and quite sensitive about the misuse of the word et al!...
I didn’t know that he actually spent time. That makes my distrust even deeper because I don’t know what the prison release conditions were!...
Not “*easily* breakable today” by a second grader!! That was just AN EXAMPLE! Edit: I checked the wikilink you gave and the two cyphers are not...
Chrono, Are you suggesting that people of insufficient cryptographic expertise should be screwed by conn artists while you, I and most posters...
What can I say about your insightful reply?! Cute smiley and the spelling of your initials is correct! Just curious... Why do you say...
That's a highly unusual and long reply! I only have the time right now to comment on your last statement because the comment I have in mind is...
I just don't know about Phil's new venture! Half the new company is ex DoD and, once in DoD, always in DoD! It looks to me like Uncle...
Thank you! Now I know what is called. I'm NOT a cryptographer; I'm a retired h/w designer, which is the area of my inventions. I knew the...
LowWaterMark, In post #10 of the previous version of the current thread I made a reference to Chronomatic's comment in another thread about my...
It is not needed! Encryption/decryption is easy and well within the computing capabilities of a cash register. Bruteforcing... That's another...
CloneRanger, I added download pwd to the virus files on my server. for the record, however, I've never experienced any effects of these viruses...
So far, nothing happened! Some views but no replies, or any signs of curiosity! Do you happen to know the UID of the MS AntiMalware guy? I...
Separate names with a comma.