Date: Thu, 16 Mar 2000 21:46:09 -0800 From: Doug Barton <Doug@gorean.org> To: goodleaf <john@home.com> Cc: freebsd-questions@freebsd.org Subject: Re: Off Topic AND Newbie-ish! Security... Message-ID: <38D1C6A1.D22C8E2@gorean.org> References: <Pine.BSF.4.21.0003161410210.20064-100000@C702312-A.sttln1.wa.home.com>
next in thread | previous in thread | raw e-mail | index | archive | help
goodleaf wrote: > > Apologies for off-topic post. <sycophant>But the people on this list have > the highest average competence I know of--mailing list wise.</sycophant> Yeah yeah... just make sure the check doesn't bounce. :) > How secure is a pkzipped file that has been zipped with a password? The way you measure "security" is by weighing the cost of breaking the security vs. the cost of the data. PKzip passes are crackable, all it takes is a brute force attack. The question is how much computing time will it take to crack it, and how much will that time cost your enemies? > My > company is considering exchanging data, possibly sensitive, with another > company who wants to "encrypt" by pkzipping to a password. There is no substitute for PGP. There are even windows versions available, so your client has no excuses. Do your research, pick a PGP implementation that will work for you and go with it. If the data falls into the wrong hands, it's your ass in the wringer, so don't take any chances. Good luck, Doug -- "While the future's there for anyone to change, still you know it seems, it would be easier sometimes to change the past" - Jackson Browne, "Fountain of Sorrow" To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?38D1C6A1.D22C8E2>