|
wrote:
You have effectively decrypted some those words, but have not brokethe encryption.
Your own use of the word 'decrypted' shows there's really no difference.
Whether you get the password by mathematically breaking the encryption,
by a brute-force dictionary attack, by dumpster diving, or via social
engineering (asking the user for the password -- actually works quite
well) the result is the same, you now have access to the system. While
the distinction may be one your PhD thesis advisor appreciates, your
customers whose credit-cards are now compromised, the press, and your
auditors are much less likely to care about the difference. :-)
-Walden
--
Walden H Leverich III
Tech Software
(516) 627-3800 x3051
WaldenL@xxxxxxxxxxxxxxx
http://www.TechSoftInc.com
Quiquid latine dictum sit altum viditur.
(Whatever is said in Latin seems profound.)
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.