From: wiseleo@juno.com (Leonid S Knyshov)
To: jer+@andrew.cmu.edu
Message Hash: 2d680e0b46048f6d244cc16194ca22d1a95dc193f293ee4196020b459263060a
Message ID: <19970125.090725.11470.2.wiseleo@juno.com>
Reply To: <199701250958.BAA23622@toad.com>
UTC Datetime: 1997-01-25 17:12:44 UTC
Raw Date: Sat, 25 Jan 1997 09:12:44 -0800 (PST)
From: wiseleo@juno.com (Leonid S Knyshov)
Date: Sat, 25 Jan 1997 09:12:44 -0800 (PST)
To: jer+@andrew.cmu.edu
Subject: Re: Encrypting ZIP disks
In-Reply-To: <199701250958.BAA23622@toad.com>
Message-ID: <19970125.090725.11470.2.wiseleo@juno.com>
MIME-Version: 1.0
Content-Type: text/plain
>"David E. Smith" <dsmith@prairienet.org> writes:
>> 7. Secure sensitive files.
>> To keep sensitive or confidential information safe, store it
>> on a Zip disk and use your Zip Tools software to assign a
>> password that must be used in order to read from or write to
>> the disk. At work, you can protect sensitive information
>> such as personnel files, company directories, and product
>> plans and designs. At home, you can secure personal
>> information such as tax records, budgets, and computerized
>> checkbooks.
>
>FWIW (not much), Iomega claims that it can't recover the data on a
>password-protected disk. However, they do export those things, so I
>doubt it's strong.
Well, I think one way to find out is to create 2 identical zip disks and
encrypt them with different passwords. Then do sector by sector compare
and see where the beast is hiding at :)
Leo.
Return to January 1997
Return to “wiseleo@juno.com (Leonid S Knyshov)”