1997-01-25 - Re: Encrypting ZIP disks

Header Data

From: wiseleo@juno.com (Leonid S Knyshov)
To: jer+@andrew.cmu.edu
Message Hash: 2d680e0b46048f6d244cc16194ca22d1a95dc193f293ee4196020b459263060a
Message ID: <19970125.090725.11470.2.wiseleo@juno.com>
Reply To: <199701250958.BAA23622@toad.com>
UTC Datetime: 1997-01-25 17:12:44 UTC
Raw Date: Sat, 25 Jan 1997 09:12:44 -0800 (PST)

Raw message

From: wiseleo@juno.com (Leonid S Knyshov)
Date: Sat, 25 Jan 1997 09:12:44 -0800 (PST)
To: jer+@andrew.cmu.edu
Subject: Re: Encrypting ZIP disks
In-Reply-To: <199701250958.BAA23622@toad.com>
Message-ID: <19970125.090725.11470.2.wiseleo@juno.com>
MIME-Version: 1.0
Content-Type: text/plain


>"David E. Smith" <dsmith@prairienet.org> writes:
>> 7.  Secure sensitive files.
>>      To keep sensitive or confidential information safe, store it
>>      on a Zip disk and use your Zip Tools software to assign a
>>      password that must be used in order to read from or write to
>>      the disk.  At work, you can protect sensitive information
>>      such as personnel files, company directories, and product
>>      plans and designs.  At home, you can secure personal
>>      information such as tax records, budgets, and computerized
>>      checkbooks.
>
>FWIW (not much), Iomega claims that it can't recover the data on a
>password-protected disk. However, they do export those things, so I
>doubt it's strong.

Well, I think one way to find out is to create 2 identical zip disks and
encrypt them with different passwords. Then do sector by sector compare
and see where the beast is hiding at :)

Leo.





Thread