Search:
Type: Posts; User: cimotaflow; Keyword(s):
Search:
Search took 0.03 seconds.
-
September 18th, 2003, 04:01 AM
I'm not asking for this software to be coded. I'm inquiring about a program that is already written. Anyone know where such a program is?
-
September 18th, 2003, 03:24 AM
Most of the time they'll never see your response to their spam.
-
September 18th, 2003, 03:09 AM
I'm looking for a software program that will allow me to encrypt (very good encryption) a message (text, images) and set it to expire either by date of after one viewing/execution. I want to send it...
-
April 28th, 2002, 04:39 AM
Actually ZoneAlarm and other firewall software distribution companies are working night and day to resolve the *outgoing* holes in their firewall software.
One might think that it is only the...
-
April 28th, 2002, 03:19 AM
Recently I stumbled up a site that a claims that ZoneAlarm (et al) is "too leaky."
There is a small, downloadable utility on the site that is said to be able to penetrate "every firewall on the...
-
April 28th, 2002, 03:06 AM
Bucket,
I'll try to be of a little more help... If I understand you correctly, you are trying to remove a keylogger program (or need information on it).
The only thing I can think of is to...
-
April 28th, 2002, 12:27 AM
A keylogger is indeed a Trojan, but that is the point.
-
April 28th, 2002, 12:22 AM
Hey bucket, take a look at this article as a starting point:
http://www.techtv.com/products/software/story/0,23008,3375077,00.html
[Many times good information is found by looking at its...
-
April 27th, 2002, 11:14 PM
It is better not to ask why someone needs a keylogger... :)
The problem I have found with them is that they hog system resources, and even prohibit or greatly inhibit certain processes (le.g....
-
April 27th, 2002, 11:06 PM
I think BrainStop offers a good point, which may be coming close to the "reasonable" answer. Whether or not it's close enough to the definitive legal facts in the matter remains to be seen (as also...
-
April 27th, 2002, 10:19 PM
I've seen this keyboard in action. There is an *.ini file that contains redirects to an HP site, prior to executing the actual location that you have configured to the buttons. [This is not unlike...
-
April 27th, 2002, 09:12 PM
Hi, I found a great console utility that will allow you to archive your files (tighter than ZIP) and apply strong encryption to them.
I tried it and it works great. It would be nice if it had a...
-
April 27th, 2002, 07:48 AM
Have you heard what the US Department of Justice's policy on encryption is? The Administration is against it, unless there is a "recovery system" (backdoor).
[I'm sure they must realize that...
-
April 27th, 2002, 07:08 AM
I was thinking that vocalizing a password could fall under the "right to remain silent."
The Fifth Amendment:
"No person shall be held to answer for a capital, or otherwise infamous crime, unless...
-
April 27th, 2002, 06:01 AM
I'd just like to know if one can be legally forced (backed by legal punishment) for not disclosing a password, when requested by authorities.
-
April 27th, 2002, 05:52 AM
I'm trying to find out if it is legal (in the USA) for a person to withold passwords from authorities. It is legal? I "heard" that one can without passwords, to keep from incriminating...
|
|