writes: I have been a windows desktop tech since 3.1 and around the early 2000's took the web developer direction. I am somewhat ashamed to admit that until the recent spat of news I have never investigated encryption.
After a few nights of drinking from the PGP firehose and discussing encrypting my emails and such with a fellow web developer who has about as much knowledge as me in the PGP arena we have come to a loggerhead.
He believes that some time shortly after 1996 PGP was basically compromised by the U.S. government and that any versions afterwards can quite easily be decrypted, basically making the process a waste of time.
I explained that Gpg4win and other open source PGP versions would be obvious to the community if they were compromised.
Maybe I am so uninformed that I am not even asking the right questions, so, I present this question to the /. community at large: PGP — Hacked or not?
writes: Effective November 1st, 2012, PayPal is updating its user agreement requiring any disputes between you and PayPal to be settled by binding, "final" arbitration. According to user notifications, you have until December 1st, 2012 to opt out, however, no facilities or links to do so are provided.Link to Original Source
writes: The Internet will fall dark for many who have failed to clean their system from a DNS changing virus aptly name DNSChanger on July 9th 2012 at 12:01am. The virus had affected up to 4 million PC's redirecting traffic to look-alike sites such as Google and Bing to steal credentials and ultimately millions of dollars for the creators. The US FBI set up interim servers instead of taking down 4 million infected users Internet worldwide, however, after almost 5 years they will now pull the plug on these servers and the estimated 304,000 PC's still infected will no longer be able to access the internet. The FBI has a step-by-step method for you to see if you are infected in this pdf document or you can go to dcwg.org for an automated check if you are so inclined.Link to Original Source
writes: Upon logging in to my Google Checkout account I found this little message:
"Google Checkout 2009 Fee Changes
On May 5, 2009, Google Checkout's transaction processing fees will be changing from 2.0% + $0.20 per transaction to a new tiered pricing structure, where the rates will vary depending on the amount of your monthly sales processed through Checkout."
Digging a little further shows the meat of the new changes...
"New fee structure starting May 5, 2009
At that time, we'll also be discontinuing the free transaction processing promotion for AdWords advertisers. Any AdWords transaction processing credits accrued during April 2009 will be applied towards transactions that occur on May 1-4, 2009.
Beginning on May 5, 2009, transaction processing rates will be determined by your sales volume during the prior calendar month minus any refunds:
Monthly sales under $3,000 2.9% + $0.30 per transaction
$3,000 — $9,999.99 2.5% + $0.30
$10,000 — $99,999.99 2.2% + $0.30
$100,000 or more 1.9% + $0.30"
Beating up the little guy and reducing rates for the higher monthly transaction people just seems like a recipe for organized credit card theft nirvana from where I'm sitting.
writes: Working at a University and with the increasing amount of security break ins, lost data and the real potential for massive identity theft due to the data that my departments deal with, we have decided to implement a USB thumb drive encryption policy.
After two days of trying many many free and paid software solutions I am finding that there is a real problem in usability and portability of encrypted data on USB drives. The goal is to provide a seamless, easy way for users to simply drag and drop their files.
Every solution I have come across so far either requires an administrator to install the file system level drivers or leaves the data un-encrypted until it is specifically selected and encrypted. Neither of these solutions will work as I know my users and when they bring their PowerPoint slides to remote locations they will not have administrator access and relying on them to manually select and encrypt/decrypt files is simply not going to happen.
Are there any solutions where a user can simply plug in the USB drive, put in their password, and drag and drop encrypted files?