February 27, 2017

Two Safari’s

May 11, 2004 A.P. Lawrence

Look carefully at the image below. You see two Safari icons in the Dock (one third from the left, the other next to the app/doc divider), and also two Safari browsers open, both on the same site and page, but displaying very differently. The Font preferences are also shown, and this is what makes them different. […]

File and email encryption with GnuPG (PGP) part five

May 10, 2004 Brian Hatch

Verification is part of any security system. SSH, FTP, POP, and IMAP servers ask for your password before it lets you log into the machine, get your files, or snag your email. NTP can be configured to require keys before it’ll let you mess with it’s clock. CIFS requires a password or kerberos tickets before granting you access to shares. […]

Help with Windows 98 / Internet Explorer Problem

April 27, 2004 Carey Holzman

Hello Mr. Holzman,

I have been tweaking my computer trying to fix it since Mcafee royally messed it up, I can no longer update windows or when I click on a link a blank page appears and or if I right click on the link it will not open. Any suggestions? I have IE6

Thank You,
S. L. […]

File and Email Encryption With GnuPG (PGP) Part Four

April 26, 2004 Brian Hatch

GnuPG and other PGP implementations allow you to encrypt (scramble the data so only intended recipients can read it) and/or sign (provide proof that the data has been unaltered in transit). As you should remember, PGP keys are made up of two parts, a public key and a private key. The public key can (and in most cases should) be available to anyone – there’s no harm in allowing it out to the entire world. The private key should be kept somewhere secure, protected with a strong passphrase. […]

1 2 3 28