Berkeley CSUA MOTD:Entry 43984
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2024/12/25 [General] UID:1000 Activity:popular
12/25   

2006/8/12-14 [Computer/SW/Security] UID:43984 Activity:nil
8/12    Anybody know of a good backup solution for PGP encrypted disks?
        The way I've been backing up is to make copies of the .pgd file
        with dates in the filename.  This method is not very scalable as my
        .pgd files are becoming gigabytes in size.  Anybody know
        of an integrated solution to backups and encrypted folders/disks?
        OS X Leopard "time machine" backup feature looks interesting.  But
        I don't think it works if all my files are in PGP disks/directories.
        Any other solutions that integrate encryption and backups? -thanks.
        \_ This is Windows, right?  (Dunno if PGPDisk exists on another OS.)
           Wouldn't anything that checks to see if a drive letter is attached
           do the trick?  Also, is this for personal backups, enterprise-
           level, what?  -John
2024/12/25 [General] UID:1000 Activity:popular
12/25   

You may also be interested in these entries...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/7/13-8/19 [Computer/SW/Security, Computer/Companies/Yahoo] UID:54436 Activity:nil
7/13    Why would Yahoo store passwords unencrypted?  I recall that even 20+
        years ago the passwords stored in /etc/passwd on instructional
        machines here at Cal were one-way encrypted.  (I think those were
        Ultrix machines.)
        \_ Doesn't this say anything already?
           http://finance.yahoo.com/echarts?s=YHOO+Interactive#symbol=yhoo;range=5y
	...
2010/3/9-30 [Computer/HW/CPU, Computer/SW] UID:53748 Activity:nil
3/9     http://www.engadget.com/2010/03/09/1024-bit-rsa-encryption-cracked-by-carefully-starving-cpu-of-ele
        I failed to see why you must starve the CPU of electricity. Why
        can't you just simulate that in software?
        \_ And if you can simulate that in software, why not just single-
           stepping the simulated CPU and get the key out?
	...
2009/12/29-2010/1/19 [Computer/SW/Security] UID:53607 Activity:nil
12/29   Sounds like the GSM encryption key has been recovered via a
        brute force attack:
        http://www.nytimes.com/2009/12/29/technology/29hack.html
	...
2008/12/2-6 [Computer/SW/Apps, Academia/Berkeley/CSUA/Motd] UID:52140 Activity:kinda low
12/1    Just curious -- what do you guys generally use soda for? Why do you
        log on? Personally, I use it to keep a presence on IRC and AIM/gTalk
        at all times, and mess around with some Python programming (been
        setting up Twisted and such so I can play with making an irc bot).
        --toulouse
        \_ I use it to post SHIT, er, I mean, spill my guts about the company
	...
2008/11/11-26 [Computer/SW/Mail] UID:51911 Activity:nil
11/11   My RAID box has an email alert setting that requires an SMTP
        server. Are there non-encrypted smtp servers I can use?
        \_ yes
	...
2008/8/5-10 [Computer/HW/Laptop] UID:50783 Activity:nil
8/5     Laptop with names of 33K people in the 'Clear' program stolen.  Data
        was (of course) unencrypted.
        http://www.schneier.com/blog/archives/2008/08/laptop_with_tru.html
        \_ http://news.yahoo.com/s/nm/20080805/bs_nm/tjx_theft_charges_dc
           When are people going to learn to encrypt sensitive data?
           \_ When encryption becomes transparent enough that noone has
	...
2008/7/20-23 [Computer/HW/Laptop, Computer/SW/Security] UID:50640 Activity:nil
7/20    Does my encrypted disk LVM everything partition scheme make my
        laptop consume a lot more power than if I weren't using encrypted
        LVM?
	...
2008/6/25-7/14 [Computer/SW/Security] UID:50380 Activity:nil
6/25    some XCF or CSUA person had a web page about a project they were
        working on where I set up a machine, and you set up a machine
        somewhere, and they both passively back each other, i believe with
        an encryption key so i can't read your backups.  when your disk
        catches on fire, i just give you a copy of your data.  anyone remember
        the name of this?
	...