RE: Simple Effective Secure Email

From: Jonathan Loh (kj6loh_at_yahoo.com)
Date: 09/12/04

  • Next message: Nick Falcon: "RE: learning ethical hacking"
    Date: Sat, 11 Sep 2004 17:39:59 -0700 (PDT)
    To: Raoul Armfield <armfield@amnh.org>, LordInfidel@directionweb.com, 'Steve' <securityfocus@delahunty.com>, security-basics@securityfocus.com
    
    

    Just an extra step that's all.

    1. Save the message
    2. Go to where you saved the message and edit it. You may have to do a
        little editing of the file to get all the extraneous email stuff out of the

        file.
    3. Decrypt it.

    Ok maybe two.
    --- Raoul Armfield <armfield@amnh.org> wrote:

    > :-----Original Message-----
    > :From: LordInfidel@directionweb.com
    > :[mailto:LordInfidel@directionweb.com]
    > :Sent: Wednesday, September 08, 2004 4:36 PM
    > :To: 'Steve'; security-basics@securityfocus.com
    > :Subject: RE: Simple Effective Secure Email
    > :
    > :-----BEGIN PGP SIGNED MESSAGE-----
    > :Hash: SHA1
    > :
    > :What you want is PGP (www.pgp.com), there are several versions.
    > :You want the freeware version unless you are using exchange, then
    > :you need the workgroup version. I'm not sure if it works with
    > :outlook express, but I can't see why it wouldn't.
    > :
    >
    > FYI PGP freeware as of version 8 no longer encrypts or decrypts email.
    > So you would have to purchase it but considering that it is only about
    > $40.00 it wont break the bank
    >
    > Raoul
    >
    >
    > ---------------------------------------------------------------------------
    > Computer Forensics Training at the InfoSec Institute. All of our class sizes
    > are guaranteed to be 12 students or less to facilitate one-on-one
    > interaction with one of our expert instructors. Gain the in-demand skills of
    > a certified computer examiner, learn to recover trace data left behind by
    > fraud, theft, and cybercrime perpetrators. Discover the source of computer
    > crime and abuse so that it never happens again.
    >
    > http://www.infosecinstitute.com/courses/computer_forensics_training.html
    > ----------------------------------------------------------------------------
    >
    >

                    
    _______________________________
    Do you Yahoo!?
    Shop for Back-to-School deals on Yahoo! Shopping.
    http://shopping.yahoo.com/backtoschool

    ---------------------------------------------------------------------------
    Computer Forensics Training at the InfoSec Institute. All of our class sizes
    are guaranteed to be 12 students or less to facilitate one-on-one
    interaction with one of our expert instructors. Gain the in-demand skills of
    a certified computer examiner, learn to recover trace data left behind by
    fraud, theft, and cybercrime perpetrators. Discover the source of computer
    crime and abuse so that it never happens again.

    http://www.infosecinstitute.com/courses/computer_forensics_training.html
    ----------------------------------------------------------------------------


  • Next message: Nick Falcon: "RE: learning ethical hacking"

    Relevant Pages

    • Re: a tool like nestat
      ... >a certified computer examiner, learn to recover trace data left behind by ... >fraud, theft, and cybercrime perpetrators. ...
      (Security-Basics)
    • Re: a tool like nestat
      ... > a certified computer examiner, learn to recover trace data left behind by ... > fraud, theft, and cybercrime perpetrators. ...
      (Security-Basics)
    • RE: a tool like nestat
      ... interaction with one of our expert instructors. ... Gain the in-demand skills of ... a certified computer examiner, learn to recover trace data left behind by ...
      (Security-Basics)
    • Re: a tool like nestat
      ... > interaction with one of our expert instructors. ... Gain the in-demand skills of ... > a certified computer examiner, learn to recover trace data left behind by ...
      (Security-Basics)
    • RE: a tool like nestat
      ... interaction with one of our expert instructors. ... Gain the in-demand skills of ... a certified computer examiner, learn to recover trace data left behind by ...
      (Security-Basics)