<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments for David&#039;s Church Information Technology	</title>
	<atom:link href="/comments/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>David Szpunar: Owner, Servant 42 and Servant Voice</description>
	<lastBuildDate>Sun, 21 Apr 2024 01:29:54 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.2</generator>
	<item>
		<title>
		Comment on My Tasks, Projects and Stuff (now playing: Toodledo) by Scatterbrained &#124; The Secret Life of Yarn		</title>
		<link>/2008/09/22/toodledo-tasks-todo-review/comment-page-1/#comment-17798</link>

		<dc:creator><![CDATA[Scatterbrained &#124; The Secret Life of Yarn]]></dc:creator>
		<pubDate>Sun, 18 Nov 2012 07:46:09 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=293#comment-17798</guid>

					<description><![CDATA[[...] I had two wonderful months with that program before it was ripped away from me. It wasn&#8217;t enough time to fully test out whether the system could withstand the sheer volume of tasks I wanted to throw at it, but at that point it functioned so much better than anything I could ever get on the BlackBerry I didn&#8217;t care. If I really needed to I could probably set up a separate list on the computer for the crafting so I didn&#8217;t tax the iPod too much. I also hadn&#8217;t had time to check out Toodledo and learn their system AT ALL. I was too distracted by the shiny new iPod. WUT?pic from infotech.davidszpunar.com [...]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] I had two wonderful months with that program before it was ripped away from me. It wasn&#8217;t enough time to fully test out whether the system could withstand the sheer volume of tasks I wanted to throw at it, but at that point it functioned so much better than anything I could ever get on the BlackBerry I didn&#8217;t care. If I really needed to I could probably set up a separate list on the computer for the crafting so I didn&#8217;t tax the iPod too much. I also hadn&#8217;t had time to check out Toodledo and learn their system AT ALL. I was too distracted by the shiny new iPod. WUT?pic from infotech.davidszpunar.com [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Exchange 2010: Moderation and Nested Bypass by David Szpunar		</title>
		<link>/2009/11/11/exchange-2010-moderation-nested-bypass/comment-page-1/#comment-17789</link>

		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Sat, 18 Aug 2012 21:17:53 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=425#comment-17789</guid>

					<description><![CDATA[Rich, it would be set on the parent I believe, though it&#039;s been a while since I&#039;ve looked at this...]]></description>
			<content:encoded><![CDATA[<p>Rich, it would be set on the parent I believe, though it&#8217;s been a while since I&#8217;ve looked at this&#8230;</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Exchange 2010: Moderation and Nested Bypass by Rich		</title>
		<link>/2009/11/11/exchange-2010-moderation-nested-bypass/comment-page-1/#comment-17788</link>

		<dc:creator><![CDATA[Rich]]></dc:creator>
		<pubDate>Tue, 14 Aug 2012 19:33:29 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=425#comment-17788</guid>

					<description><![CDATA[So this needs to be set on the parent or the child?]]></description>
			<content:encoded><![CDATA[<p>So this needs to be set on the parent or the child?</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on VisiWave Wireless Site Survey by I Can Play The Merakis!		</title>
		<link>/2007/03/10/visiwave-wireless-site-survey/comment-page-1/#comment-17084</link>

		<dc:creator><![CDATA[I Can Play The Merakis!]]></dc:creator>
		<pubDate>Tue, 21 Feb 2012 14:38:34 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/03/10/visiwave-wireless-site-survey/#comment-17084</guid>

					<description><![CDATA[[...] satellite modem. And that part had been done for us! We primarily tested the existing network using VisiWave to document signal strength, and moved the fourth access point around to various locations to make [...]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] satellite modem. And that part had been done for us! We primarily tested the existing network using VisiWave to document signal strength, and moved the fourth access point around to various locations to make [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Bye Meraki, Hello Open-Mesh: Revisiting the Campground WiFi! by David Szpunar		</title>
		<link>/2009/07/23/open-mesh-wifi-order/comment-page-1/#comment-17083</link>

		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Mon, 20 Feb 2012 18:29:10 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=391#comment-17083</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;/2009/07/23/open-mesh-wifi-order/comment-page-1/#comment-17082&quot;&gt;Matt Krapf&lt;/a&gt;.

Hi Matt,

I haven&#039;t been thrilled with the Enterprise version of Open Mesh, but the basic Open Mesh units are still...functioning. In a situation where you really need mesh, I&#039;d probably look at them again. Only for limited internet access though, not really for robust LAN networking. They fill a need, but anywhere I can I&#039;m using &lt;a href=&quot;http://www.ubnt.com/unifi&quot; title=&quot;Ubiquity UniFi&quot; rel=&quot;nofollow&quot;&gt;Ubiquity&#039;s UniFi&lt;/a&gt; APs instead of Open Mesh. They do have wireless uplinks that are OK (not true mesh, you control each uplink) but if you can wire all or more access points, they&#039;re a much better solution that&#039;s more flexible and powerful, and reliable. At around the same price; less if you consider they include their PoE (proprietary, not standard PoE) adapter and the Open Mesh adapters cost an extra $20. For a single building where I can get wires to switches and APs, I&#039;d do UniFi all day long (I&#039;ve done several small deployments plus one 8-AP and one 20-AP deployment of UniFi and they&#039;re all working great).

There are also some other Ubiquity products such as the NanoStations and NanoBridges that can do directional point-to-point connections, and PicoStations that are omnidirectional but use the same software as the Nano devices instead of the centralized &quot;Enterprise wifi&quot; controller of the UniFi solution. It might cost a little more, but I&#039;d actually prefer a solution using all Ubiquity gear over the Open Mesh stuff. For example, I&#039;d have a central building with a PicoStation AP with each remote building using a NanoStation or NanoBridge directional unit pointed at the PicoStation and running a cable to a UniFi AP that would serve clients at each location. Preferably the central location would also be directional but if they&#039;re close enough, a PicoStation (or possibly even a UniFi AP) placed centrally with directionals pointing in toward it would probably work well enough. If you can do all the backhaul on 5GHz (not possible with UniFi AP as central since it only does 2.4GHz but PicoStation comes in 5GHz flavors) and then use UniFi on 2.4GHz for clients you&#039;ll be even better off, if you can get line-of-sight for 5GHz. Nice thing is for larger buildings you could still put a switch in and put multiple UniFi APs off of it around the building.

I&#039;d need a lot more detail about the physical structures to make any more specific recommendations. However, I&#039;m just &quot;mostly satisfied&quot; with Open Mesh and not really thrilled or excited about it. It still works where I put it in, but I probably wouldn&#039;t do it that way again.

David]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="/2009/07/23/open-mesh-wifi-order/comment-page-1/#comment-17082">Matt Krapf</a>.</p>
<p>Hi Matt,</p>
<p>I haven&#8217;t been thrilled with the Enterprise version of Open Mesh, but the basic Open Mesh units are still&#8230;functioning. In a situation where you really need mesh, I&#8217;d probably look at them again. Only for limited internet access though, not really for robust LAN networking. They fill a need, but anywhere I can I&#8217;m using <a href="http://www.ubnt.com/unifi" title="Ubiquity UniFi" rel="nofollow">Ubiquity&#8217;s UniFi</a> APs instead of Open Mesh. They do have wireless uplinks that are OK (not true mesh, you control each uplink) but if you can wire all or more access points, they&#8217;re a much better solution that&#8217;s more flexible and powerful, and reliable. At around the same price; less if you consider they include their PoE (proprietary, not standard PoE) adapter and the Open Mesh adapters cost an extra $20. For a single building where I can get wires to switches and APs, I&#8217;d do UniFi all day long (I&#8217;ve done several small deployments plus one 8-AP and one 20-AP deployment of UniFi and they&#8217;re all working great).</p>
<p>There are also some other Ubiquity products such as the NanoStations and NanoBridges that can do directional point-to-point connections, and PicoStations that are omnidirectional but use the same software as the Nano devices instead of the centralized &#8220;Enterprise wifi&#8221; controller of the UniFi solution. It might cost a little more, but I&#8217;d actually prefer a solution using all Ubiquity gear over the Open Mesh stuff. For example, I&#8217;d have a central building with a PicoStation AP with each remote building using a NanoStation or NanoBridge directional unit pointed at the PicoStation and running a cable to a UniFi AP that would serve clients at each location. Preferably the central location would also be directional but if they&#8217;re close enough, a PicoStation (or possibly even a UniFi AP) placed centrally with directionals pointing in toward it would probably work well enough. If you can do all the backhaul on 5GHz (not possible with UniFi AP as central since it only does 2.4GHz but PicoStation comes in 5GHz flavors) and then use UniFi on 2.4GHz for clients you&#8217;ll be even better off, if you can get line-of-sight for 5GHz. Nice thing is for larger buildings you could still put a switch in and put multiple UniFi APs off of it around the building.</p>
<p>I&#8217;d need a lot more detail about the physical structures to make any more specific recommendations. However, I&#8217;m just &#8220;mostly satisfied&#8221; with Open Mesh and not really thrilled or excited about it. It still works where I put it in, but I probably wouldn&#8217;t do it that way again.</p>
<p>David</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Bye Meraki, Hello Open-Mesh: Revisiting the Campground WiFi! by Matt Krapf		</title>
		<link>/2009/07/23/open-mesh-wifi-order/comment-page-1/#comment-17082</link>

		<dc:creator><![CDATA[Matt Krapf]]></dc:creator>
		<pubDate>Mon, 20 Feb 2012 18:17:22 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=391#comment-17082</guid>

					<description><![CDATA[Now 2 more years later, how does/did the Open-Mesh gear hold up?  I&#039;m looking at it as we speak and it seems to fit our bill for a campground in shallow mountain valley.

PLEASE contact me with your observations and thoughts.
Thank you.
Matt]]></description>
			<content:encoded><![CDATA[<p>Now 2 more years later, how does/did the Open-Mesh gear hold up?  I&#8217;m looking at it as we speak and it seems to fit our bill for a campground in shallow mountain valley.</p>
<p>PLEASE contact me with your observations and thoughts.<br />
Thank you.<br />
Matt</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Unauthorized DHCP Servers: DENIED! by David Szpunar		</title>
		<link>/2009/09/08/unauthorized-dhcp-servers-denied/comment-page-1/#comment-17075</link>

		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Tue, 13 Dec 2011 02:22:27 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=395#comment-17075</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;/2009/09/08/unauthorized-dhcp-servers-denied/comment-page-1/#comment-17068&quot;&gt;Anatoliy Lisovskiy&lt;/a&gt;.

That comment seems a bit jumbled, but yes I have found it frustrating when something is written for Internet Explorer and subsequent versions of IE don&#039;t work. Switch firmware is not immune from this. Fortunately, better companies&#039; newer products seem to be coming with much more cross-browser compatibility (especially as the last several releases of browsers gain more dynamic features and are a little more standardized in how they are implemented) which also tends to fix the &quot;new browser doesn&#039;t work&quot; issue as a nice little side-effect.

Doesn&#039;t help the old stuff that&#039;s still poorly-written of course. But eventually (and in some churches, eventually is a long time!) this gear will be obsolete and will be replaced. It is a slow cycle.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="/2009/09/08/unauthorized-dhcp-servers-denied/comment-page-1/#comment-17068">Anatoliy Lisovskiy</a>.</p>
<p>That comment seems a bit jumbled, but yes I have found it frustrating when something is written for Internet Explorer and subsequent versions of IE don&#8217;t work. Switch firmware is not immune from this. Fortunately, better companies&#8217; newer products seem to be coming with much more cross-browser compatibility (especially as the last several releases of browsers gain more dynamic features and are a little more standardized in how they are implemented) which also tends to fix the &#8220;new browser doesn&#8217;t work&#8221; issue as a nice little side-effect.</p>
<p>Doesn&#8217;t help the old stuff that&#8217;s still poorly-written of course. But eventually (and in some churches, eventually is a long time!) this gear will be obsolete and will be replaced. It is a slow cycle.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Outlook 2007 PDF Preview by David Szpunar		</title>
		<link>/2007/04/01/outlook-2007-pdf-preview/comment-page-1/#comment-17074</link>

		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Tue, 13 Dec 2011 02:15:48 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/04/01/outlook-2007-pdf-preview/#comment-17074</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;/2007/04/01/outlook-2007-pdf-preview/comment-page-1/#comment-17073&quot;&gt;Jim King&lt;/a&gt;.

Check your Outlook Rules and Alerts settings. I had a customer recently who had this happening and they had a recently-created rule that sent everything sent &quot;directly to me&quot; to the Junk E-Mail folder (thus only getting stuff they were BCC&#039;d on and such, but nothing with their email address in the To: field).]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="/2007/04/01/outlook-2007-pdf-preview/comment-page-1/#comment-17073">Jim King</a>.</p>
<p>Check your Outlook Rules and Alerts settings. I had a customer recently who had this happening and they had a recently-created rule that sent everything sent &#8220;directly to me&#8221; to the Junk E-Mail folder (thus only getting stuff they were BCC&#8217;d on and such, but nothing with their email address in the To: field).</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Outlook 2007 PDF Preview by Jim King		</title>
		<link>/2007/04/01/outlook-2007-pdf-preview/comment-page-1/#comment-17073</link>

		<dc:creator><![CDATA[Jim King]]></dc:creator>
		<pubDate>Sun, 11 Dec 2011 18:41:24 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/04/01/outlook-2007-pdf-preview/#comment-17073</guid>

					<description><![CDATA[All incoming mail in Microsoft Outlook 2007 goes directly into junk folder. No incoming mail appears in
my inbox]]></description>
			<content:encoded><![CDATA[<p>All incoming mail in Microsoft Outlook 2007 goes directly into junk folder. No incoming mail appears in<br />
my inbox</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Outlook 2007 PDF Preview by Garreth		</title>
		<link>/2007/04/01/outlook-2007-pdf-preview/comment-page-1/#comment-17072</link>

		<dc:creator><![CDATA[Garreth]]></dc:creator>
		<pubDate>Tue, 22 Nov 2011 19:55:48 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/04/01/outlook-2007-pdf-preview/#comment-17072</guid>

					<description><![CDATA[can&#039;t open pdf files &#038; atachments]]></description>
			<content:encoded><![CDATA[<p>can&#8217;t open pdf files &amp; atachments</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Microsoft Outlook 2007 PDF Preview &#8211; Now Part of Adobe Reader 8.1 by Aston		</title>
		<link>/2007/08/15/microsoft-outlook-2007-pdf-preview-now-part-of-adobe-reader-81/comment-page-1/#comment-17071</link>

		<dc:creator><![CDATA[Aston]]></dc:creator>
		<pubDate>Tue, 15 Nov 2011 04:52:38 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/08/15/microsoft-outlook-2007-pdf-preview-now-part-of-adobe-reader-81/#comment-17071</guid>

					<description><![CDATA[i haven&#039;t work with acrobat reader previewer in Msoutlook 2007.]]></description>
			<content:encoded><![CDATA[<p>i haven&#8217;t work with acrobat reader previewer in Msoutlook 2007.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Unauthorized DHCP Servers: DENIED! by Anatoliy Lisovskiy		</title>
		<link>/2009/09/08/unauthorized-dhcp-servers-denied/comment-page-1/#comment-17068</link>

		<dc:creator><![CDATA[Anatoliy Lisovskiy]]></dc:creator>
		<pubDate>Fri, 04 Nov 2011 03:56:27 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=395#comment-17068</guid>

					<description><![CDATA[When switches do something they should not do they don&#039;t do properly what normal switches must do. They are no more switches, but not yet neither routers, nor firewalls. 

I mean all that HP strategy called &quot;Fix problems&quot; instead of &quot;Go for the goal&quot;. HP and Microsoft in technical terms are very alike, they both go for money fixing problems. Instead of getting money offering better designed and implemented products. As the result, for example, HP management software can&#039;t run on Microsoft OS because HP did not expect Microsoft to fix new bugs in IE making HP Insight Manager incompatible.

It is bad solution when some problem created by messy network planning is &quot;fixed&quot; by the device that is not supposed to deal with such problems. 

Anyway, thank you for the article, now we know what to do if some switch stops switching...]]></description>
			<content:encoded><![CDATA[<p>When switches do something they should not do they don&#8217;t do properly what normal switches must do. They are no more switches, but not yet neither routers, nor firewalls. </p>
<p>I mean all that HP strategy called &#8220;Fix problems&#8221; instead of &#8220;Go for the goal&#8221;. HP and Microsoft in technical terms are very alike, they both go for money fixing problems. Instead of getting money offering better designed and implemented products. As the result, for example, HP management software can&#8217;t run on Microsoft OS because HP did not expect Microsoft to fix new bugs in IE making HP Insight Manager incompatible.</p>
<p>It is bad solution when some problem created by messy network planning is &#8220;fixed&#8221; by the device that is not supposed to deal with such problems. </p>
<p>Anyway, thank you for the article, now we know what to do if some switch stops switching&#8230;</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Network and coax cable ready to unspool into the ceiling by Louise F.		</title>
		<link>/2007/11/17/wire-wire-everywhere-now-its-in-the-ceiling/network-and-coax-cable-ready-to-unspool-into-the-ceiling/comment-page-1/#comment-17059</link>

		<dc:creator><![CDATA[Louise F.]]></dc:creator>
		<pubDate>Wed, 26 Oct 2011 19:57:37 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/wp-content/uploads/2007/11/photo_111407_001.jpg#comment-17059</guid>

					<description><![CDATA[Haha! Now that&#039;s an innovative way of setting up spools and spools of cables. Great suggestion!]]></description>
			<content:encoded><![CDATA[<p>Haha! Now that&#8217;s an innovative way of setting up spools and spools of cables. Great suggestion!</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Microsoft and Adobe Non-Profit Charity Pricing: Get It! by Colonel		</title>
		<link>/2008/03/12/microsoft-and-adobe-non-profit-charity-pricing/comment-page-1/#comment-17011</link>

		<dc:creator><![CDATA[Colonel]]></dc:creator>
		<pubDate>Thu, 15 Sep 2011 08:53:56 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=217#comment-17011</guid>

					<description><![CDATA[Alakaaazm-information found, problem solved, thanks!]]></description>
			<content:encoded><![CDATA[<p>Alakaaazm-information found, problem solved, thanks!</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on DHCP Security? by website designers		</title>
		<link>/2007/03/02/dhcp-security/comment-page-1/#comment-17006</link>

		<dc:creator><![CDATA[website designers]]></dc:creator>
		<pubDate>Sat, 10 Sep 2011 19:45:34 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/03/02/dhcp-security/#comment-17006</guid>

					<description><![CDATA[I was curious if you ever thought of changing the layout of your website? Its very well written; I love what youve got to say. But maybe you could a little more in the way of content so people could connect with it better. Youve got an awful lot of text for only having 1 or two images. Maybe you could space it out better?]]></description>
			<content:encoded><![CDATA[<p>I was curious if you ever thought of changing the layout of your website? Its very well written; I love what youve got to say. But maybe you could a little more in the way of content so people could connect with it better. Youve got an awful lot of text for only having 1 or two images. Maybe you could space it out better?</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on TrueCrypt Whole-Disk Encryption: Why I Turned It Off by Keith Miller		</title>
		<link>/2008/02/18/truecrypt-whole-disk-encryption-why-i-turned-it-off/comment-page-1/#comment-16998</link>

		<dc:creator><![CDATA[Keith Miller]]></dc:creator>
		<pubDate>Mon, 22 Aug 2011 08:08:10 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2008/02/18/truecrypt-whole-disk-encryption-why-i-turned-it-off/#comment-16998</guid>

					<description><![CDATA[Here is what TrueCrypt say about TPM, fyi.

Some encryption programs use TPM to prevent attacks. Will TrueCrypt use it too?

No. Those programs use TPM to protect against attacks that require the attacker to have administrator privileges, or physical access to the computer, and the attacker needs you to use the computer after such an access. However, if any of these conditions is met, it is actually impossible to secure the computer (see below) and, therefore, you must stop using it (instead of relying on TPM).

If the attacker has administrator privileges, he can, for example, reset the TPM, capture the content of RAM (containing master keys) or content of files stored on mounted TrueCrypt volumes (decrypted on the fly), which can then be sent to the attacker over the Internet or saved to an unencrypted local drive (from which the attacker might be able to read it later, when he gains physical access to the computer).

If the attacker can physically access the computer hardware (and you use it after such an access), he can, for example, attach a malicious component to it (such as a hardware keystroke logger) that will capture the password, the content of RAM (containing master keys) or content of files stored on mounted TrueCrypt volumes (decrypted on the fly), which can then be sent to the attacker over the Internet or saved to an unencrypted local drive (from which the attacker might be able to read it later, when he gains physical access to the computer again).

The only thing that TPM is almost guaranteed to provide is a false sense of security (even the name itself, &quot;Trusted Platform Module&quot;, is misleading and creates a false sense of security). As for real security, TPM is actually redundant (and implementing redundant features is usually a way to create so-called bloatware). Features like this are sometimes referred to as security theater [6].

~~~~~

For me, I can download and scrutinize the TC code (and I have done this, even compiling it and running it) so I would expect that if I can do this, many people smarter than me have done so and we&#039;d know about any back-doors in TrueCrypt by now.

With respect to M$ backdoors; how would you trace through M$ source? Personally I don&#039;t think M$ would have a back-door either, but you have to admit that you can be less sure about that, than for TrueCrypt.]]></description>
			<content:encoded><![CDATA[<p>Here is what TrueCrypt say about TPM, fyi.</p>
<p>Some encryption programs use TPM to prevent attacks. Will TrueCrypt use it too?</p>
<p>No. Those programs use TPM to protect against attacks that require the attacker to have administrator privileges, or physical access to the computer, and the attacker needs you to use the computer after such an access. However, if any of these conditions is met, it is actually impossible to secure the computer (see below) and, therefore, you must stop using it (instead of relying on TPM).</p>
<p>If the attacker has administrator privileges, he can, for example, reset the TPM, capture the content of RAM (containing master keys) or content of files stored on mounted TrueCrypt volumes (decrypted on the fly), which can then be sent to the attacker over the Internet or saved to an unencrypted local drive (from which the attacker might be able to read it later, when he gains physical access to the computer).</p>
<p>If the attacker can physically access the computer hardware (and you use it after such an access), he can, for example, attach a malicious component to it (such as a hardware keystroke logger) that will capture the password, the content of RAM (containing master keys) or content of files stored on mounted TrueCrypt volumes (decrypted on the fly), which can then be sent to the attacker over the Internet or saved to an unencrypted local drive (from which the attacker might be able to read it later, when he gains physical access to the computer again).</p>
<p>The only thing that TPM is almost guaranteed to provide is a false sense of security (even the name itself, &#8220;Trusted Platform Module&#8221;, is misleading and creates a false sense of security). As for real security, TPM is actually redundant (and implementing redundant features is usually a way to create so-called bloatware). Features like this are sometimes referred to as security theater [6].</p>
<p>~~~~~</p>
<p>For me, I can download and scrutinize the TC code (and I have done this, even compiling it and running it) so I would expect that if I can do this, many people smarter than me have done so and we&#8217;d know about any back-doors in TrueCrypt by now.</p>
<p>With respect to M$ backdoors; how would you trace through M$ source? Personally I don&#8217;t think M$ would have a back-door either, but you have to admit that you can be less sure about that, than for TrueCrypt.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on TrueCrypt Whole-Disk Encryption: Why I Turned It Off by Jeff T		</title>
		<link>/2008/02/18/truecrypt-whole-disk-encryption-why-i-turned-it-off/comment-page-1/#comment-16997</link>

		<dc:creator><![CDATA[Jeff T]]></dc:creator>
		<pubDate>Mon, 22 Aug 2011 06:12:16 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2008/02/18/truecrypt-whole-disk-encryption-why-i-turned-it-off/#comment-16997</guid>

					<description><![CDATA[I&#039;ve used both TrueCrypt and Bitlocker on various systems and I see Bitlock as the winner for the simple fact the unencrypted boot environment is verified by the TPM.  Another awesome feature is the ability to require the TPM pin + a USB startup key.  Took me a bit to set is up as you&#039;re stuck using the manage-bde utility.  If you super parnoid, I managed to use a biometric flash drive (SanDisk Cruzer Profile) to store the startup key.  Since it&#039;s capable of doing the fingerprint verification in hardware, you&#039;re able to scan at boottime.  So now you need TPM+Pin+USB Key+Fingerprint.
Of course if your computer didn&#039;t come with a Trusted Platform Module, than they&#039;re even.  Really just depends on whether you want to enter a password (TC) or use a USB key (BL).

As far as the hibernation issues go, it solved.  Microsoft finally provided an API that Truecrypt employs.  So no unencrypted keys floating around as some may still think. I still see comments that reference the infamous &quot;coldboot&quot; attack.  For starters, I know bitlocker at least can force an overwrite of memory.  Regardless, if you simply wait until the computer shuts off, they wait a minute longer.  Unless you&#039;re on the arctic tundra, you can be well assured the RAM is unrecoverable at this point.  Key point though, remember that standby will, by definition, keep the RAM refreshed.  Hibernation writes the contents of RAM to the disk that is encrypted, therefore no issues there.

Last point is regarding backdoors.  No I didn&#039;t trace line by line thru MS code, but I am quite sure there are no backdoors.  Why am I so confident? 1.) MS gains nothing. 2.) They risk their credibility. 3.) Rememeber that whole anti-trust thing?? Yeah, somehow I doubt MS will be rushing anytime soon to help the gov&#039;t.  4.) There has never been an mandate for encryption makers to add backdoors for govt access.  This is the US afterall.]]></description>
			<content:encoded><![CDATA[<p>I&#8217;ve used both TrueCrypt and Bitlocker on various systems and I see Bitlock as the winner for the simple fact the unencrypted boot environment is verified by the TPM.  Another awesome feature is the ability to require the TPM pin + a <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Universal Serial Bus' );"><acronym class="uttInitialism">USB</acronym></span> startup key.  Took me a bit to set is up as you&#8217;re stuck using the manage-bde utility.  If you super parnoid, I managed to use a biometric flash drive (SanDisk Cruzer Profile) to store the startup key.  Since it&#8217;s capable of doing the fingerprint verification in hardware, you&#8217;re able to scan at boottime.  So now you need TPM+Pin+<span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Universal Serial Bus' );"><acronym class="uttInitialism">USB</acronym></span> Key+Fingerprint.<br />
Of course if your computer didn&#8217;t come with a Trusted Platform Module, than they&#8217;re even.  Really just depends on whether you want to enter a password (TC) or use a <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Universal Serial Bus' );"><acronym class="uttInitialism">USB</acronym></span> key (BL).</p>
<p>As far as the hibernation issues go, it solved.  Microsoft finally provided an API that Truecrypt employs.  So no unencrypted keys floating around as some may still think. I still see comments that reference the infamous &#8220;coldboot&#8221; attack.  For starters, I know bitlocker at least can force an overwrite of memory.  Regardless, if you simply wait until the computer shuts off, they wait a minute longer.  Unless you&#8217;re on the arctic tundra, you can be well assured the RAM is unrecoverable at this point.  Key point though, remember that standby will, by definition, keep the RAM refreshed.  Hibernation writes the contents of RAM to the disk that is encrypted, therefore no issues there.</p>
<p>Last point is regarding backdoors.  No I didn&#8217;t trace line by line thru MS code, but I am quite sure there are no backdoors.  Why am I so confident? 1.) MS gains nothing. 2.) They risk their credibility. 3.) Rememeber that whole anti-trust thing?? Yeah, somehow I doubt MS will be rushing anytime soon to help the gov&#8217;t.  4.) There has never been an mandate for encryption makers to add backdoors for govt access.  This is the US afterall.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Network and coax cable ready to unspool into the ceiling by Eric		</title>
		<link>/2007/11/17/wire-wire-everywhere-now-its-in-the-ceiling/network-and-coax-cable-ready-to-unspool-into-the-ceiling/comment-page-1/#comment-16985</link>

		<dc:creator><![CDATA[Eric]]></dc:creator>
		<pubDate>Tue, 31 May 2011 22:33:27 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/wp-content/uploads/2007/11/photo_111407_001.jpg#comment-16985</guid>

					<description><![CDATA[What a really good idea. I&#039;ve had to run a lot of cat5 in my last job but we never thought about using chairs to help the spools.]]></description>
			<content:encoded><![CDATA[<p>What a really good idea. I&#8217;ve had to run a lot of cat5 in my last job but we never thought about using chairs to help the spools.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on TrueCrypt Whole-Disk Encryption: Why I Turned It Off by Keith M		</title>
		<link>/2008/02/18/truecrypt-whole-disk-encryption-why-i-turned-it-off/comment-page-1/#comment-16984</link>

		<dc:creator><![CDATA[Keith M]]></dc:creator>
		<pubDate>Mon, 16 May 2011 08:31:49 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2008/02/18/truecrypt-whole-disk-encryption-why-i-turned-it-off/#comment-16984</guid>

					<description><![CDATA[I love the first comment: &quot;Bitlocker is the way to go. I’ve never used TrueCrypt.&quot;

Good one Kyle; perfectly balanced opinion.

I&#039;ve personally used both and both were easy enough to set up but over the years I have settled on TrueCrypt; it handles RAID0, RAID1, and is generally very robust.

Oh, and I use it on multiple Windows 7 systems without a single problem ever, so who knows what entalazar is on about.]]></description>
			<content:encoded><![CDATA[<p>I love the first comment: &#8220;Bitlocker is the way to go. I’ve never used TrueCrypt.&#8221;</p>
<p>Good one Kyle; perfectly balanced opinion.</p>
<p>I&#8217;ve personally used both and both were easy enough to set up but over the years I have settled on TrueCrypt; it handles RAID0, RAID1, and is generally very robust.</p>
<p>Oh, and I use it on multiple Windows 7 systems without a single problem ever, so who knows what entalazar is on about.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on SMS Text Messaging and Churches by Reginald		</title>
		<link>/2009/05/26/sms-churches/comment-page-1/#comment-16983</link>

		<dc:creator><![CDATA[Reginald]]></dc:creator>
		<pubDate>Fri, 06 May 2011 04:56:40 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=375#comment-16983</guid>

					<description><![CDATA[Another Great Affordable Church Texting Service and an iPhone APP for The Church, www.apps4us.org]]></description>
			<content:encoded><![CDATA[<p>Another Great Affordable Church Texting Service and an iPhone APP for The Church, <a href="http://www.apps4us.org/" rel="nofollow ugc">http://www.apps4us.org/</a></p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
