On Fri, Dec 2, 2011 at 10:26 PM, Charles Morris <cmor...@cs.odu.edu> wrote:
> Valdis, > > > (For real fun, consider that published and unpublished works are treated > differently. And > > a password list almost always becomes a published work without the > permission of > > the author(s) ;) > > Talking of currently implemented systems... > > One could argue that the author of lists resulting from cracked hashes > is the cracker, > as the cracker is simply computing one of the infinite collisions that > each hash intrinsically has. > > on a related note: http://en.wikipedia.org/wiki/Illegal_number http://en.wikipedia.org/wiki/Illegal_prime -- Ferenc Kovács @Tyr43l - http://tyrael.hu
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/