Security Basics mailing list archives
Re: File Encryption - Part II
From: Patrick Boucher <pboucher () gardienvirtuel com>
Date: Tue, 16 Sep 2003 11:42:23 -0400
Greetings, I have been said in this same message tread. Lots of people are using PGP. For one, i am using it. Version 8.0 on Windows XP. PGPDisk, create a file then "mount " that file to a drive like S: or something, There is an Option for you to use NTFS mount file.. so you could have c:\secret that is completely encrypted. Else, pgp can encrypt a file. Using either a Public Key or Shared Secret (password) PGP is one of the mostly used encryption software found around. Why not use it ? Patrick On Monday 15 September 2003 20:47, Rick Jones wrote:
I have put off file encryption for a long time, but this thread prompted me to get started. So I created a folder called "Secrets," then created a text document called "Passwords," then did everything I was supposed to do to encrypt "Secrets" and all of its subfolders and files. The "Passwords" file turned a nice green color and showed itself as being encrypted. So far, so good. Then I e-mailed the "Passwords" file to someone, and asked them if they could open it. Sure enough, they could. So I am wondering...just what is file encryption supposed to accomplish? What I would like is a program or something I can use to encrypt a folder and all of its contents, and that absolutely will not open without a password or some other fairly airtight indicator that the creator -- and no one other than the creator -- wants to get in. Can anyone suggest how I might accomplish this? Thanks, RWJ _________________________________________________________________ Compare Cable, DSL or Satellite plans: As low as $29.95. https://broadband.msn.com --------------------------------------------------------------------------- Captus Networks Are you prepared for the next Sobig & Blaster? - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans - Precisely Define and Implement Network Security - Automatically Control P2P, IM and Spam Traffic FIND OUT NOW - FREE Vulnerability Assessment Toolkit http://www.captusnetworks.com/ads/42.htm --------------------------------------------------------------------------- -
--------------------------------------------------------------------------- Captus Networks Are you prepared for the next Sobig & Blaster? - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans - Precisely Define and Implement Network Security - Automatically Control P2P, IM and Spam Traffic FIND OUT NOW - FREE Vulnerability Assessment Toolkit http://www.captusnetworks.com/ads/42.htm ----------------------------------------------------------------------------
Current thread:
- Re: File Encryption - Part II Rick Jones (Sep 16)
- Re: File Encryption - Part II Patrick Boucher (Sep 16)
- RE: File Encryption - Part II Lucas Zaichkowsky (Sep 16)
- <Possible follow-ups>
- RE: File Encryption - Part II Neil Fryer (Sep 16)
- RE: File Encryption - Part II Kenneth Buchanan (Sep 16)
- Re: File Encryption - Part II Kamal Habayeb (Sep 16)
- RE: File Encryption - Part II Kenneth Buchanan (Sep 16)
- RE: File Encryption - Part II Milli Bit (Sep 23)
- RE: File Encryption - Part II Milli Bit (Sep 23)
- Re: File Encryption - Part II Kamal Habayeb (Sep 23)
- RE: File Encryption - Part II Meidinger Chris (Sep 23)
- RE: File Encryption - Part II Chris Berry (Sep 23)