1997-01-27 - Re: WinKrypt

Header Data

From: gt@kdn0.attnet.or.jp (Gemini Thunder)
To: Frank Willoughby <frankw@in.net>
Message Hash: 6d591d3aec75fec05e2894b05cfafa846cec7b9d67dc4b745bc05059ef03bddb
Message ID: <32ed4fa1.277575631@kdn0.attnet.or.jp>
Reply To: <199701270226.SAA03590@toad.com>
UTC Datetime: 1997-01-27 06:52:49 UTC
Raw Date: Sun, 26 Jan 1997 22:52:49 -0800 (PST)

Raw message

From: gt@kdn0.attnet.or.jp (Gemini Thunder)
Date: Sun, 26 Jan 1997 22:52:49 -0800 (PST)
To: Frank Willoughby <frankw@in.net>
Subject: Re: WinKrypt
In-Reply-To: <199701270226.SAA03590@toad.com>
Message-ID: <32ed4fa1.277575631@kdn0.attnet.or.jp>
MIME-Version: 1.0
Content-Type: text/plain


Thus sprach Frank Willoughby <frankw@in.net>:

>Out of curiosity, is anyone familiar with WinKrypt by Syncronsys?

Syncronsys [sp?] Software is the maker of SoftRam95, a program that
 supposedly doubled your memory through memory compression and other
 quasi-magical means. It was later revealed that not only did it not
 work as advertised, but it actually did not do anything at all
 (except display graphs indicating non-existant improvements).  IIRC,
 they lost a class action suit over this issue.

I would trust an encryption program relased to the public by the NSA
 more than anything these charlatans released.

[snip]
>I was curious how it compares to McAfee's PC Crypto which uses 
>40-bit DES or 160-bit Blowfish (user-chooses) & other PC/laptop
>encryption products.  BTW, I would also appreciate your input 
>on any crypto products which you believe to be robust, easy-to-use 
>& secure.  (I know I can only have 2 out of 3, but it's worth a try 
>anyway).  8^)  

I consider PGP to be robust, easy-to-use (with some front-end
 assistance), and secure.  However, I am by no means an authority on
 crypto.

__________
- 2[b]||!2[b] /* What's the question?  It's a tautology! */
- 0x2B|!0x2B  /* == FFFFFFFF */






Thread