On Tue, Mar 23, 2010 at 04:09:24PM +, Rhiannon Buck wrote:
>Hello
>
>
>
>After moving servers I was having trouble with GnuPG so I generated a new
>set of keys in my own name. They work in the command line:
>
>gpg --encrypt -ao encrypteddata -r rhian...@viva.org.uk data
>
>
On Fri, Mar 19, 2010 at 06:48:52PM -0400, Robert J. Hansen wrote:
> On 3/19/2010 5:36 PM, FederalHill wrote:
> > Are there refernces where such procedures are detailed that I might look at?
>
> http://scholar.google.com
>
> Check for "encrypted database rekeying".
>
>
Maybe I'm doing it wrong,
On Sat, Mar 20, 2010 at 08:49:46AM -0400, Jerry wrote:
> On Sat, 20 Mar 2010 11:17:03 +
> Brad Rogers articulated:
>
> >On Fri, 19 Mar 2010 19:44:38 -0400
> >"Robert J. Hansen" wrote:
> >
> >Hello Robert,
> >
> >> half-dozen of us calling this guy's workplace and getting him in
> >> trouble
On Fri, Mar 19, 2010 at 02:17:12PM -0300, M.B.Jr. wrote:
> Hi Daniel,
>
>
> On Thu, Mar 18, 2010 at 8:50 AM, Daniel Eggleston wrote:
> > I know it's sort of a contradiction in terms, but hear me out:
> >
> > The case I'm looking at is a High Availability environment hosting a
> > database. The d