encryption vs encoding

C

candace

AFTER READING EXTENSIVELY ABOUT THE CRYPTO APPLICATIONS
FOR SENDING MESSAGES AND SHARING PRIVATE FILES, IT WOULD
BE HELPFUL TO ALSO LEARN HOW TO REMOVE THESE PROGRAMS
SINCE THEY WERE NOT PART OF THE ORIGINAL "MARRIAGE PLAN".
HAD I AGREED TO MY HUSBAND ENCODING OUR SYSTEM FOR MASKED
APPLICATIONS..MESSAGING AND TOOLS, I WOULD CERTAINLY
UNDERSTAND THE ENCRYPTION AND MESSAGING RUNNING THROUGH
OUR TEMPORARY FILE SYSTEMS.
SINCE I DID NOT AGREE TO THIS, I WOULD APPRECIATE ANY
EXPERT ADVICE FROM "NORMAL" PROFESSIONAL PEOPLE ON THIS
SUBJECT.
 
T

TC

candace said:
AFTER READING EXTENSIVELY ABOUT THE CRYPTO APPLICATIONS
FOR SENDING MESSAGES AND SHARING PRIVATE FILES, IT WOULD
BE HELPFUL TO ALSO LEARN HOW TO REMOVE THESE PROGRAMS
SINCE THEY WERE NOT PART OF THE ORIGINAL "MARRIAGE PLAN".
HAD I AGREED TO MY HUSBAND ENCODING OUR SYSTEM FOR MASKED
APPLICATIONS..MESSAGING AND TOOLS, I WOULD CERTAINLY
UNDERSTAND THE ENCRYPTION AND MESSAGING RUNNING THROUGH
OUR TEMPORARY FILE SYSTEMS.
SINCE I DID NOT AGREE TO THIS, I WOULD APPRECIATE ANY
EXPERT ADVICE FROM "NORMAL" PROFESSIONAL PEOPLE ON THIS
SUBJECT.

This newsgroup is for questions about Microsoft Access, the database
management system. It is nothing to do with messaging, cryptography,
hidden programs or similar.

TC
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top