Penetration Testing mailing list archives

Re: PGP 9.0


From: "David M. Zendzian" <dmz () dmzs com>
Date: Fri, 06 Jan 2006 14:33:46 -0800

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

http://www.pgpi.com
Here you may download <http://www.pgpi.org/download/> the latest 
freeware PGP version for your platform.

It's only up to pgp8, but if you are looking for the latest freeware 
version, it's either gnupg you need or the version here.

David
dmz

Smith, Michael J. wrote:

The trial version is the free version.  After the trial expires or if
you do not give it a trial license, it shuts off the mail client and IM
support.  It will still encrypt and decrypt and do key management.



Michael J Smith, CISSP-ISSEP michael.j.smith () unisys com
Information Security Architect
703.419.3109 W
703.855.0890 C
"Those who do not understand Unix are condemned to reinvent it, poorly."

--Henry Spencer

 

-----Original Message-----
From: kuffya () gmail com [mailto:kuffya () gmail com]
Sent: Friday, January 06, 2006 6:58 AM
To: pen-test () securityfocus com
Subject: PGP 9.0

Hi list,

This topic is not really pen-test specific but I feel it is very often
relevant and I haven't seen it mentioned anywhere else. The question
   

is:
 

Whatever happened to the freeware version of PGP?? It seems that the
latest v9.0 is only offered as 'trial' from pgp.com. I searched
   

everywhere
 

(pgpi.org mit's site etc) but noone has a freewere version anymore
   

(for
 

windows).
Of course, if you insist you can find in the depths of the web copies
   

of
 

pgp version 8, for free, and perfectly legal. And there is always
   

GnuPG so
 

the situation is not desperate yet. I was just wondering if anyone has
   

any
 

info on the topic ; has the app silently gone commercial?

Thanks
S.




   

------------------------------------------------------------------------
--
 

----
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on
   

your
 

website. Up to 75% of cyber attacks are launched on shopping carts,
   

forms,
 

login pages, dynamic content etc. Firewalls, SSL and locked-down
   

servers
 

are
futile against web application hacking. Check your website for
vulnerabilities
to SQL injection, Cross site scripting and other web attacks before
hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831

   

------------------------------------------------------------------------
--
 

-----
   



------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------





 


-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.2 (Build 2424)

iQA/AwUBQ77wVJcwFRNrWbm9EQKM4wCgnFbewymTdrBLR3K84m/AqKowvdsAn0PA
vi0jAywBdYKzxwc8vpp27ykE
=3MdJ
-----END PGP SIGNATURE-----

------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


Current thread: