From: gt@kdn0.attnet.or.jp (Gemini Thunder)
To: Frank Willoughby <frankw@in.net>
Message Hash: 6d591d3aec75fec05e2894b05cfafa846cec7b9d67dc4b745bc05059ef03bddb
Message ID: <32ed4fa1.277575631@kdn0.attnet.or.jp>
Reply To: <199701270226.SAA03590@toad.com>
UTC Datetime: 1997-01-27 06:52:49 UTC
Raw Date: Sun, 26 Jan 1997 22:52:49 -0800 (PST)
From: gt@kdn0.attnet.or.jp (Gemini Thunder)
Date: Sun, 26 Jan 1997 22:52:49 -0800 (PST)
To: Frank Willoughby <frankw@in.net>
Subject: Re: WinKrypt
In-Reply-To: <199701270226.SAA03590@toad.com>
Message-ID: <32ed4fa1.277575631@kdn0.attnet.or.jp>
MIME-Version: 1.0
Content-Type: text/plain
Thus sprach Frank Willoughby <frankw@in.net>:
>Out of curiosity, is anyone familiar with WinKrypt by Syncronsys?
Syncronsys [sp?] Software is the maker of SoftRam95, a program that
supposedly doubled your memory through memory compression and other
quasi-magical means. It was later revealed that not only did it not
work as advertised, but it actually did not do anything at all
(except display graphs indicating non-existant improvements). IIRC,
they lost a class action suit over this issue.
I would trust an encryption program relased to the public by the NSA
more than anything these charlatans released.
[snip]
>I was curious how it compares to McAfee's PC Crypto which uses
>40-bit DES or 160-bit Blowfish (user-chooses) & other PC/laptop
>encryption products. BTW, I would also appreciate your input
>on any crypto products which you believe to be robust, easy-to-use
>& secure. (I know I can only have 2 out of 3, but it's worth a try
>anyway). 8^)
I consider PGP to be robust, easy-to-use (with some front-end
assistance), and secure. However, I am by no means an authority on
crypto.
__________
- 2[b]||!2[b] /* What's the question? It's a tautology! */
- 0x2B|!0x2B /* == FFFFFFFF */
Return to January 1997
Return to “gt@kdn0.attnet.or.jp (Gemini Thunder)”