Encrypting files

Discussion in 'Networking and Security' started by intradaybill, Jan 31, 2010.

  1. Kana is sufficiently uncivil that I'm considering putting him on ignore.
    But I'll give him 2.5-3 days to decrypt my challenge file first. :D
     
    #21     Jan 31, 2010
  2. kana

    kana

    You guys don't know jack. What's even more sad is that some of you IT guys don't know jack about TRUE SECURITY

    [​IMG]
     
    #22     Jan 31, 2010
  3. Man you really are a jerkwad.

    I actually do know what I am talking about ... did you even read my post jerkwad?

    Of course there is better encryption ... of course there are better hacks.

    Of course the easy 256 bit can be busted ... c'mon ... get a brain.

    Of course Government agencies have the best equipment to decrypt and fast.

    Of course skilled hacks can decrypt and fast ... get a grip.


    What I supplied works ... and works well. Very well.

    The point is ... stuff is as secure as you make it.
    Rather than bothering with complicated stuff that can be a hassle
    to use or slow your system down ... layers and sequences and
    multiple encryptions make it near impossible for all but the best.

    And at that level of motivation, agency or power ... it can be faster to intimidate or threaten.

    So I don't know what you are thinking except that you need to
    boast of your massively wonderful skills and encryption methods.

    Show me what you use. links please ... if it is better and easy ... I might switch.

    Otherwise shut your pie hole.

    If some butt-stain jerkwad like you tried getting in my system ...
    it would take .25 seconds for me to pummel you and drop you in the mountains.

    "Go away kid you bother me."
     
    #23     Jan 31, 2010
  4. kana

    kana

    PC tempest protected

    [​IMG]
     
    #24     Jan 31, 2010
  5. kana

    kana

    How true security looks like

    [​IMG]
     
    #25     Jan 31, 2010
  6. Wow - you're psychic too! You somehow know what I know. Amazing! Catch ya on Thursday.
     
    #26     Jan 31, 2010
  7. OK. Your a jerkwad ... but you have a point. I am not up on current
    security levels and technologies available to date. (My research is dated.)

    There are a lot of tricks and tech available.
    I can make an aggregate fatpipe within a 1 mile neighborhood cloud for free fast internet as an example.

    So lets assume your more than a rude jerkwad and actually aren't
    blowing theoretical smoke to puff up your already rude front.

    Show some links to support what you say.

    I dig this stuff:
    Show tech links that support the tech level you talk about.
    Show security and encryption links that support at least some of your claims.

    I will peruse them.

    Oh ... and decrypt that file from truecrypt that was offered to you.
    According to you ... it will only take you so very little time and effort
    that it should take more time to wipe your arse than a simple thing like that.

    So show it or shut it.
     
    #27     Jan 31, 2010
  8. kana

    kana

    You know what man, you know what,

    Why don't I tell you straight in your face.

    Even though it is obvious you want me to do all the search and share my information I have on TEMPEST cause you are lazy. I was going to do it.

    But now you insult me completely by saying that I should waste 3 days of my computing power just to show you how pathetic TrueCrypt is.

    Not even mentioning that I have a TRADING BUSINESS to run on Monday morning.

    Screw you man

    SCREW YOU BUDDY :cool:
     
    #28     Jan 31, 2010
  9. Code7

    Code7

    Keep in mind that TrueCrypt only protects your data as long as you don't use it. Mounted volumes are as easily accessible as if they were unencrypted.
     
    #29     Jan 31, 2010
  10. Nobody forced you to be here on ET.
     
    #30     Jan 31, 2010