Yuval Hager wrote:
בThursday 23 April 2009, נכתב על ידי Yuval Hager:
On Thursday 23 April 2009, Shachar Shemesh wrote:
I should point out one huge disadvantage of storing binary diffs when
using encrypted systems. There is no (practical) way to erase old
backups. Your backup storage siz
בThursday 23 April 2009, נכתב על ידי Yuval Hager:
> On Thursday 23 April 2009, Shachar Shemesh wrote:
> > I should point out one huge disadvantage of storing binary diffs when
> > using encrypted systems. There is no (practical) way to erase old
> > backups. Your backup storage size is bound to be
> its a standard application, but I do understand your point. if you
> "insist", you can install the App on a U3 disc format. this way it
> will run from the USB without the need to reinstall it.
>
Then how would you connect to a Linux machine?
> as for the app:
> - http://www.download3k.com/In
> This one runs in kernel space and plants itself beneath the keyboard
> driver, so it can capture everything and is almost undetectable.
And Windows will run that as a "portable app", ie, no installation
required? A malicious entity can just run that on any public computer
and collect info?
> Th
> I can write a Windows key logger in about half an hour, and I don't think
> you would need admin in order to run it (making it run in other people's
> session is another matter).
>
I see. Coming from the Linux world, I just figured that if it was
doable then someone had already made such a tool
Dotan Cohen wrote:
Try this:
http://amecisco.com/iks2000.htm
It's a limited demo version, but enough to give you an idea.
Thanks, Shahar. It seems that this is something that the computer
admin must install, not a "portable app" or something similar. So, so
long as I trust the admin (for
> Try this:
> http://amecisco.com/iks2000.htm
> It's a limited demo version, but enough to give you an idea.
>
Thanks, Shahar. It seems that this is something that the computer
admin must install, not a "portable app" or something similar. So, so
long as I trust the admin (for instance, at the Tec
On Saturday 25 April 2009, 13:11, Dotan Cohen wrote:
> Really? Should I be worried? For that matter, do you have the address
> of some keylogging software that I could play with in a virtual
> Windows machine? I have googled just now, but I cannot find anything
> that doesn't cost money. I will be
> Easy,
> 1. connect the USB
> 2. Run the TrueCrypt (http://www.truecrypt.org/)
This is the problematic step. If you came to my computer with your USB
key and asked to install a program so that you could use your key, I
would not let you. Nor could you use it at a public facility such as a
library
Easy,
1. connect the USB
2. Run the TrueCrypt (http://www.truecrypt.org/)
3. Mount the un-partitioned disk (on the USB) drive. I will be asked
for the password in the mounting process.
[10 seconds, so far]
Unless the station has something that will copy the disk, while
connected; the password by
> Nice add-on, i initially partitioned the disk and left the
> TrueCrypt.exe in it. I can come to any computer, connect the drive
> via its USB, run the application and get the data (password etc).
>
That sounds like it depends upon the application being already
installed on the computer. How do
1. I use external drive
2. Using TrueCrypt I mount the external drive, encrypt its content and
password-protected it.
3. I backup all my data to this drive.
4. Data is encrypted, password protected and on un-recognized drive.
Once the drive is connected to a PC, you need to re-mount it using
TrueC
On Friday 24 April 2009 09:34:40 you wrote:
> P.s.
> Blowfish? In this day and age?
Twofish, I stand corrected. Their specks are very confusing:
* They claim that the transport is based on https
* They claim that the encryption key is stored on my computer, but i see no
documentation on the lo
Before I begin, I should point out that I never brought my company's
service up in this thread. Yes, rsyncrypto is my project, and it is a
major part of the service Lingnu is offering, but it is open source,
comes built in as part of Debian and Ubuntu, and you can use it without
paying me or Li
> Asking for password in one shell line:
>
> read -r -s -p "SubVersion password for user \"$USERNAME\": " DEPLOY_PWD
>
> No biggy :)
>
I know that it is not difficult, but it remains my motivation for
treating myself to learn Python. One of these days.
--
Dotan Cohen
http://what-is-what.com
htt
2009/4/23 Dotan Cohen :
> Actually, I am aware of that problem. I had considered writing a shell
> script to automatically add the date and ask for the password, but
> decided that will be my opportunity to learn python instead. So until
> I have a spare day to get into Python I'm doing it this way
As someone who tried to convince his boss to use Shachar's product, I can tell
you that there are companies (in israel!) who sell a competing product, which
is closed source, but:
* works with a nice Java Based web interface,
* it has a CLI version (works on 64 bit as well)
* it's incremental
On Thursday 23 April 2009, Oleg Goldshmidt wrote:
> Yuval Hager writes:
> > Well, I was looking for a more streamlined solution. Something that is:
> > 1) automatic
> > 2) offsite (e.g. online)
> > 3) bandwidth and space efficient (due to (2) above)
> > 4) (opt.) encrypted
> > 5) incremental
>
> A
On Thursday 23 April 2009, Shachar Shemesh wrote:
> I should point out one huge disadvantage of storing binary diffs when
> using encrypted systems. There is no (practical) way to erase old
> backups. Your backup storage size is bound to be ever increasing. This
> is because the only way to create
>> Actually, I do not automate it. This is the command that I use to make
>> the tarball:
>> $ tar -zcvf - /home/user/ | openssl des3 -salt -k PASSWORD | dd of=DATE.tbz
>>
>> And this one to decrypt it:
>> $ dd if=DATE.tbz | openssl des3 -d -k PASSWORD | tar zvxf -
>
> So you password appears in cl
Yuval Hager writes:
> Well, I was looking for a more streamlined solution. Something that is:
> 1) automatic
> 2) offsite (e.g. online)
> 3) bandwidth and space efficient (due to (2) above)
> 4) (opt.) encrypted
> 5) incremental
A combination of tar (that can do incremental backups) and scp or
s
Dotan Cohen writes:
>> How do you use the password in an automated backup then?
>>
>
> Actually, I do not automate it. This is the command that I use to make
> the tarball:
> $ tar -zcvf - /home/user/ | openssl des3 -salt -k PASSWORD | dd of=DATE.tbz
>
> And this one to decrypt it:
> $ dd if=DATE
Yuval Hager wrote:
Thanks. I probably wasn't clear on (5). I would like to be able to go back
in time when I restore. AFAIK, rsync* solutions are mirroring the current
state only, where rdiff-backup and duplicity does allow time travel.
There is still the original question about the key hand
> Thanks. I probably wasn't clear on (5). I would like to be able to go back
> in time when I restore.
I think that you will have to wait for Stephen Hawkins to recover
before that will be possible.
> AFAIK, rsync* solutions are mirroring the current
> state only, where rdiff-backup and duplicity
On Thursday 23 April 2009, Shachar Shemesh wrote:
> Yuval Hager wrote:
> > On Thursday 23 April 2009, Dotan Cohen wrote:
> >>> How do you use the password in an automated backup then?
> >>
> >> Actually, I do not automate it. This is the command that I use to make
> >> the tarball:
> >> $ tar -zcvf
Yuval Hager wrote:
On Thursday 23 April 2009, Dotan Cohen wrote:
How do you use the password in an automated backup then?
Actually, I do not automate it. This is the command that I use to make
the tarball:
$ tar -zcvf - /home/user/ | openssl des3 -salt -k PASSWORD | dd
of=DATE.tbz
An
On Thursday 23 April 2009, Dotan Cohen wrote:
> > How do you use the password in an automated backup then?
>
> Actually, I do not automate it. This is the command that I use to make
> the tarball:
> $ tar -zcvf - /home/user/ | openssl des3 -salt -k PASSWORD | dd
> of=DATE.tbz
>
> And this one to de
> How do you use the password in an automated backup then?
>
Actually, I do not automate it. This is the command that I use to make
the tarball:
$ tar -zcvf - /home/user/ | openssl des3 -salt -k PASSWORD | dd of=DATE.tbz
And this one to decrypt it:
$ dd if=DATE.tbz | openssl des3 -d -k PASSWORD |
Yuval Hager wrote:
On Thursday 23 April 2009, Dotan Cohen wrote:
I've been considering encrypting my backups (e.g. using duplicity), but
I am always afraid to lose the backup key when I lose the data I need
to restore. This has the unfortunate implications of practically having
no backups at
On Thursday 23 April 2009, Dotan Cohen wrote:
> > I've been considering encrypting my backups (e.g. using duplicity), but
> > I am always afraid to lose the backup key when I lose the data I need
> > to restore. This has the unfortunate implications of practically having
> > no backups at all.
> >
> I've been considering encrypting my backups (e.g. using duplicity), but I am
> always afraid to lose the backup key when I lose the data I need to
> restore. This has the unfortunate implications of practically having no
> backups at all.
>
> I'd like to ask the list, when you backup your data (a
Yuval Hager wrote:
Hi,
I've been considering encrypting my backups (e.g. using duplicity), but I am
always afraid to lose the backup key when I lose the data I need to
restore. This has the unfortunate implications of practically having no
backups at all.
I'd like to ask the list, when you
Hi,
I've been considering encrypting my backups (e.g. using duplicity), but I am
always afraid to lose the backup key when I lose the data I need to
restore. This has the unfortunate implications of practically having no
backups at all.
I'd like to ask the list, when you backup your data (and
33 matches
Mail list logo