Re: Crypto File System-Problems Creating One

2005-06-14 Thread Mark Janssen
On 6/9/05, Bernd Eckenfels <[EMAIL PROTECTED]> wrote: > In article <[EMAIL PROTECTED]> you wrote: > > losetup -e aes-256 /dev/loop0 /dev/hda10 > > What do you have defined in modules? > > alias cipher-16 rijndael > > You also need the cryptoloop module in order to name ciphers by name. T

Re: which pop3/imap secure method should I use?

2005-06-14 Thread LeVA
2005. jĂșnius 14. 07:57, Radu Spineanu <[EMAIL PROTECTED]> -> debian-security@lists.debian.org,: > Ian Eure wrote: > >> On Monday 13 June 2005 04:41 pm, LeVA wrote: > >> I don't see why it would be helpful, unless you're trying to keep > > your info > > >> secret from a determined/resourceful attack

Re: which pop3/imap secure method should I use?

2005-06-14 Thread Demonen
> What's this MiTM attact means? Man in The Middle is when someone "between" you and the remote system modifies packets on their way to the remote system or back, IIRC -- Fredrik "Demonen" Vold /* - Do not meddle in the affairs of dragons, for you are crunchy and good with ketchup. */