On Fri, 22 Apr 2011 16:20:10 -0700, Trevor Myner <tmyner@sessions.net>
wrote:
>On 2011-04-22 15:11:41 -0700, bored@home.yet said:
>
>> HMS Victor Victorian <victorvictorian@hushunomail.com> wrote:
>>> On Thu, 21 Apr 2011 12:49:33 -0400, Henry Wadsworth Schultz
>>> <hwschultz@meomyo.net> wrote:
>>>
>>>> There once was a man from DC
>>>> Who tried to infiltrate an NG.
>>>> He fell on his ass
>>>> When he asked for the pass
>>>> And nobody honored his plea.
>>>
>>> Dear Sir,
>>>
>>> I find your little "ditty" trite and tedious. Moreover, I have never
>>> understood why those such as yourself insist on belittling and
>>> taunting others who have demonstrated their willingness to share, as
>>> has the poster who had made the most recent request for CrystalHigh
>>> and its backwards version.
>>>
>>> Have you anything to share, or are you simply the buffoon?
>>>
>>> HMS Victor Victorian, NP-g18.
>>>
>>> God Save the Queen.
>>> God Bless the Prince of Wales.
>>> God Preserve the Windsors.
>>> Rule Britannia!
>>
>> He probably doesn't need CrystalHigh or the backwards version - he probably
>> needs the keyfiles; and Jimmy threatened to leave for good if anyone ever
>> reposted the keyfiles (then again it seems he left for good anyway). But
>> then again any decent news server would still have the keyfiles - it's only
>> been about nine months or so.
>
>I hope jayray is paying attention.
>
>It's more than having a key, you need keyfiles. Maybe you understand
>or maybe you need to ask some questions.
Indeed. It has been some time hence. Jimmy's last post here was the
repost of February 5th. As to the need for keyfiles, I have little
doubt that Jimmy's orginals are spread far and wide by now, and, in
consideration of this, Jimmy would repost them for Jayray.
Briefly, TrueCrypt, which is available for free download (simply
Google) is convenient to use. Once the initial set up is complete,
one can encrypt files in much the same way many now password zip
files. One may lock the file with a password, or a key file or
combination of key files, or both, depending on the level of security
desired. Jimmy has used jpeg image files labled CD01, CD02, etc.,
which are found in the title of the split file posted. These letters
and numbers are only useful to select the actual picture or pictures
to unlock the combined file. The letters themselves will not
accomplish it.
When I first looked at the task of learning to use key files, it
seemed very confusing and daunting, but by simply following my own
logic, I discovered it was actually quite easy.
Jayray, I wish you luck and hopefully Jimmy (since he indicates he is
here presently, if it is indeed he) will repost those files for you.
Sincerely,
V
God Save the Queen.
God Bless the Prince of Wales.
God Preserve the Windsors.
Rule Britannia!
|
|