Even if LiveUpdates for Norton Security are not encrypted, the update process may have high integrity, provided that the transmitted product...
SteveTX, it appears that your customers are concerned. You may choose to disagree, but I respectfully recommend that you openly and honestly...
Is Lance Cottrell no longer working for Anonymizer? He is still listed as a member of that company’s executive team (see here).
I don’t think that SteveTX intends to refund money to anyone or to suspend billing for existing customers for three months (see post #549 on page...
Which VPN services have been known to ‘snitch’ on their customers?
Does “camouflaging file erasure” involve anything more than (1) attempting to destroy the file’s name through a renaming process and (2) using...
At a basic operational level (e.g., wiping a specific known file or wiping free space), this is typically true. However, an important area in...
Darkahl, you may wish to take a look at R-Wipe&Clean.
Katio, one possibility to explore (although inconvenient) is to boot from the diagnostic CD provided by the manufacturer of your PC and run the...
I suspect that the backup duration will largely be a function of your hardware and the software settings you select. For example, using...
Steve, a few questions... (1) Does the introduction of SafeHouse mean that xB VPN will no longer be using OpenVPN? (2) Will Xero Networks be...
FYI -- Small correction: Symantec is a public company, shares of which are traded on the Nasdaq exchange.
Removing the “about this chart” verbiage is disappointing, since that text clearly explained (a) that all anti-malware products (even Prevx) miss...
Wonder if this advancement will compete with or complement Kaspersky’s patent (see here and this thread)....
Note that a sample size of only 20 was used for the “blocking of malware on or post execution” test. Thus, a difference in detecting a single...
SteveTX, what does this mean precisely? Are you saying that customers will be able to use xB VPN for the next three months without incurring a...
There is a continuum, ranging from “over-promise & under-deliver” to “under-promise & over-deliver.” Behaviors at either end of the continuum are...
An interesting conversation continues... To clarify, are you claiming that the NSA will force a company to insert a backdoor (or other weakness)...
Chronomatic, the hypothesis that the NSA is forcing every vendor of encryption software to include a backdoor may be subject to an empirical test....
A very interesting post, Chronomatic! A few observations to continue the conversation... Why do you believe that the content of this single...
That is helpful to know! I suspect that ShadowProtect Desktop checks for an installed and validated copy of itself during a HIR operation as a...
In reviewing the TeraByte video Create a VMWare Workstation Machine from a Physical Machine, the process of doing a HIR restore using the OSD Tool...
Yes, that is accurate. In practice, for the individual PC user, that restriction isn’t really a limitation, since you would normally have...
This article is from 1998. Presumably, if the NSA was continuously intervening in the development of all encryption products, there would be (a)...
Note that the Desktop edition of ShadowProtect also provides the capability to “restore images to different hardware or to virtual environments...
Separate names with a comma.