Berkeley CSUA MOTD:Entry 30504
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/04/04 [General] UID:1000 Activity:popular
4/4     

2004/5/31 [Computer/SW/Security] UID:30504 Activity:high
5/31    Is there a way in Windows XP to make particular files or directories
        password protected.  This would be so that someone could you the
        administrator account, but not be able to access particular
        directories without reentering the password.
        \_ http://www.google.com/search?q=password+protected+folders+windows
        \_ EFS or pgpdisk.  EFS key mgt. is ass, pgpdisk costs money.  -John
           \_ any tips on using EFS and managing keys well for it?  Can you
              just put your key in lots of places (and depend on the password),
              e.g. on your webservers, to not lose it?  Not as secure, true,
              but I'm mostly interested in a casual thief stealing my
              laptop and getting my financial records. (anyone who really
              wants them has probably already broken into them anyway...) -!op
        \_ http://www.cypherix.com/index.htm
           I have never used it, but it claims to be free. Let me know if
           it works.
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/04/04 [General] UID:1000 Activity:popular
4/4     

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/13-8/19 [Computer/SW/Security, Computer/Companies/Yahoo] UID:54436 Activity:nil
7/13    Why would Yahoo store passwords unencrypted?  I recall that even 20+
        years ago the passwords stored in /etc/passwd on instructional
        machines here at Cal were one-way encrypted.  (I think those were
        Ultrix machines.)
        \_ Doesn't this say anything already?
           http://finance.yahoo.com/echarts?s=YHOO+Interactive#symbol=yhoo;range=5y
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
Cache (1092 bytes)
www.google.com/search?q=password+protected+folders+windows
com - Windows Tips: Password-Protect Your Sensitive Files ... Until recently, the only way to password-protect individual files or folders in Windows 98 and Me was to buy additional software. How to Password Protect Folders on Windows XP, 98, 2000, NT, ME Folder Password Expert is security software to password protect folders on the hard, network and external drives on Windows XP, 98, 2000, NT, ME computers. File & Folder Protector - password protect files and folders ... Protect your files and folders with File & Folder Protector at Windows kernel level. This great easy-to-use password-protected security utility lets you ... SoftHeap - password, security, privacy, email, Internet tools ... Protect your files and folders with File & Folder Protector at Windows kernel level. This great password-protected security utility lets you password-protect ... JodoHost Forums - Password Protecting Folders (Windows) ... Accessing password protected folders in IE 6, DirtBag, Microsoft Development, 0, 04-07-04 07:25 AM. Windows Password Protection, jt3k, Microsoft Development, 2, 04-06 ...
Cache (1414 bytes)
www.cypherix.com/index.htm
About Us About Cypherix Encryption Software Cypherix - Borderless Strong Encryption Cypherix - Borderless Strong Encryption Cypherix Encryption Software Cypherix is tightly focused on cryptography and data security. We leverage our expertise to deliver state-of-the-art, world-class encryption software packages, not bound by any restrictions. We offer easy to use unbreakable strong encryption software. Our products use 448 bit Blowfish and 256 bit AES algorithms, making it impossible for hackers to break it. Our products are designed to hide the complexities of encryption, at the same time giving you ease of use and flexibility. Just drag and drop to password protect all your confidential data. Cypherix products allow you to secure single and multiple files, folders and emails, quickly and easily, requiring relatively few computing resources and little time. You can even take a backup of encrypted data on external devices such as CD,USB,Floppy. Cryptainer PE encrypts every kind of file format, whether it is textual, tabular, graphical, organized in a database, audio or video. It also allows you to install and run programs accessible only to you. Our products are compatible with all 32-bit versions of Windows. Cypherix Encryption Software Cypherix Encryption Software Cypherix Encryption Software PC Magazine Product Review "An extremely easy and familiar way to safely store your important data.