Security Basics mailing list archives

Re: Simple Effective Secure Email


From: Calvin Maready <cc.cal () verizon net>
Date: Wed, 8 Sep 2004 13:32:21 -0700

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Would setting them up with pgp or gnupg be an option? Create their own key's 
and signatures and create a keyserver and encrypt all the emails.

On Wednesday 08 September 2004 06:42 am, Steve wrote:
If you needed to secure a handfull of people to use their email securely
what would you recommend?  Consider the email client to be Outlook Express.
I was thinking some form of a personal cert but wanted to see about
experience from the security list (you folks).







---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class
sizes are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills
of a certified computer examiner, learn to recover trace data left behind
by fraud, theft, and cybercrime perpetrators. Discover the source of
computer crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
---------------------------------------------------------------------------
-

- -- 
- -Calvin Maready
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iQEVAwUBQT9sWFvjNZV1G9miAQJcdwf/ULV82XpqiUpJXz31jAAjfd4i1NuoqJZc
CFYy7iLXvdq4ILKidcqwb0qDqN2g2ErX/3wpaycLgcypx1uJIqb+q1a8WK52CFX9
90cTaI48kpsIib2cL9QMN1vEg1YmAhU4sUbTA8gkOOKMRKZDK1DoQHxrPI5P/InW
xJFwvafC8Kcs9v4VPJ9s7s3SBgz/OUKcgOq391evnap6ZGYKAgf9wdE+vjC5SqCe
ia/2uIb+zBrSxhAx784mZqq3hek7rF6kAcIbEcpd46qcqsjvdFePEWxiujQfNLSw
8oyr4yYHkZrHts9lEGvqYd6xRtNEOuSt6jPdYU0x2co/n5xRs8ZGqw==
=8Ukn
-----END PGP SIGNATURE-----

---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------


Current thread: