tav schrieb:
>> Why is it significantly easier to protect the key[s]
>> used for the encryption than the storage itself?
>
>
> one could always passphrase-protect the key, i.e. use symmetric encryption.
>
> admittedly, this could potentially be brute-forced, but ... should be
> good enough for
> Why is it significantly easier to protect the key[s]
> used for the encryption than the storage itself?
one could always passphrase-protect the key, i.e. use symmetric encryption.
admittedly, this could potentially be brute-forced, but ... should be
good enough for most purposes?
--
have-a
Thanx to everyone who has taken part of this discussion. Tim, Dieter,
Dave. Soory for keeping silence, it gets messy just before New Year
comes.
Back to what i have played with after your advice.
1. I've tried to add gc.collect() in App.ZApplication.Cleanup.__del__(),
so when the connection is re
Tim Peters wrote at 2005-12-30 14:51 -0500:
>[Dieter Maurer]
>> They did not tell us about their application. But, Zope's database
>> adapters work like this. They use the ZODB cache (and its pool) as an RDB
>> connection pool. Thus, if the ZODB caches are not released, the RDB
>> connections won't
Please always stay on the list!
Monica chopra wrote at 2005-12-30 19:22 -0800:
> ...
> Thanks for responding but can clarify more about how to do that. How can i
> make an ecrypted file.
> ...
>Dieter Maurer <[EMAIL PROTECTED]> wrote:
> Monica chopra wrote at 2005-12-29 18:17 -0800:
>>...
>It w