Penetration Testing mailing list archives
RE: PGP 9.0
From: "Ebeling, Jr., Herman Frederick" <hfebelingjr () lycos com>
Date: Fri, 6 Jan 2006 20:54:00 -0500
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ----Original Message---- From: kuffya () gmail com [mailto:kuffya () gmail com] Sent: Friday, 06 January, 2006 06:58 To: pen-test () securityfocus com Subject: PGP 9.0 : Hi list, : : This topic is not really pen-test specific but I feel it is very often relevant and I haven't : seen it mentioned anywhere else. The question is: Whatever happened to the freeware version of : PGP?? It seems that the latest v9.0 is only offered as 'trial' from (www.pgp.com). I searched : everywhere (www.pgpi.org mit's site etc) but no one has a freeware version anymore (for windows). Of : course, if you insist you can find in the depths of the web copies of pgp version 8, for free, : and perfectly legal. And there is always GnuPG so the situation is not desperate yet. I was just : wondering if anyone has any info on the topic ; has the app silently gone commercial? : : Thanks : S. : S., Thank you for asking about PGP 9.0, as I'm sure that you're not the only one who's wondering the same thing. I have to admit that I was unaware of PGP 9.0 being available or that they no longer offered a freeware version. I had however heard, or read somewhere that PGP was working on a version that would seamlessly sign/encrypt/decrypt one's E-Mails on I think the server side. I'm sorry, but given that most virus' are able to replicate themselves via E-Mail. This too me seems as a way of making the virus appear to come from a trusted source. I mean stop and think about it for a moment. You are on a list of "secure" users and you receive an E-Mail from someone else on the list. It's both signed and encrypted, and contains an attachment that is likewise signed and encrypted. Now then ya open said E-Mail, and subsequently the attached file, only to end up with a computer virus. . . Herman Live Long and Prosper ___________________ _-_ \==============_=_/ ____.---'---`---.____ \_ \ \----._________.----/ \ \ / / `-_-' __,--`.`-'..'-_ /____ ||- `--.____,-' -----BEGIN PGP SIGNATURE----- Version: PGP 8.0.3 iQA/AwUBQ78aLB/i52nbE9vTEQJEpwCeNLLq3T4rD4d2HCWIbkKgWkJ+QcwAoM8j XaA6IP90bFcs/KH/X+wSwAq9 =ICiK -----END PGP SIGNATURE----- ------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
Current thread:
- PGP 9.0 kuffya (Jan 06)
- RE: PGP 9.0 Andy Meyers (Jan 06)
- RE: PGP 9.0 Ebeling, Jr., Herman Frederick (Jan 07)
- RE: PGP 9.0 Kyle Starkey (Jan 14)
- <Possible follow-ups>
- RE: PGP 9.0 Smith, Michael J. (Jan 06)
- Re: PGP 9.0 David M. Zendzian (Jan 06)
- RE: PGP 9.0 John E. Fleming (Jan 06)
- Re: PGP 9.0 RsH (Jan 06)
- Re: PGP 9.0 Dave Dearinger (Jan 07)
- RE: PGP 9.0 Ebeling, Jr., Herman Frederick (Jan 07)
- RE: PGP 9.0 metajunkie (Jan 07)