On Fri, 19 Mar 2010 23:26:18 -0400 John Reames <jwrea...@comcast.net> wrote:
> Decryption of the standard UNIX crypt() function is not possible by > design. > > Passwords were only stored in encrypted format, so whenever a password > was checked, the provided candidate was crypt()ed and the two crypt() > ed strings were compared Having worked with Unix systems since 1983, I knew that. But I thought maybe someone has figured out how to crack them. >> And the standard UNIX password encryption (the "weak" one, not /etc/ >> shadow) took 1 second to execute on a VAX 11/780... An intel Q6700 >> can do 8.8M crypt()'s per second, and a PS/3 can do 11.1M... Sure shows how things have progressed, doesn't it? Craig _______________________________________ http://www.okiebenz.com For new and used parts go to www.okiebenz.com To search list archives http://www.okiebenz.com/archive/ To Unsubscribe or change delivery options go to: http://okiebenz.com/mailman/listinfo/mercedes_okiebenz.com