Yep!
I'd love to find info to compare that to the capabilities of a
handheld portabe device.
About the only change has been the amount of cycles available for BFI
(now everyone has massive BFI--no Cray needed!)
I guess you could argue that the SSE/MMX (SIMD) extensions bring a lot
of vector capabilities of a Cray to a desktop...
--
John W Reames
jwrea...@comcast.net
Home: +14106646986
Mobile: +14437915905
On Mar 20, 2010, at 0:08, Craig McCluskey <diese...@pisquared.net>
wrote:
On Fri, 19 Mar 2010 23:26:18 -0400 John Reames <jwrea...@comcast.net>
wrote:
Decryption of the standard UNIX crypt() function is not possible by
design.
Passwords were only stored in encrypted format, so whenever a
password
was checked, the provided candidate was crypt()ed and the two crypt()
ed strings were compared
Having worked with Unix systems since 1983, I knew that. But I thought
maybe someone has figured out how to crack them.
And the standard UNIX password encryption (the "weak" one, not /etc/
shadow) took 1 second to execute on a VAX 11/780... An intel Q6700
can do 8.8M crypt()'s per second, and a PS/3 can do 11.1M...
Sure shows how things have progressed, doesn't it?
Craig
_______________________________________
http://www.okiebenz.com
For new and used parts go to www.okiebenz.com
To search list archives http://www.okiebenz.com/archive/
To Unsubscribe or change delivery options go to:
http://okiebenz.com/mailman/listinfo/mercedes_okiebenz.com
_______________________________________
http://www.okiebenz.com
For new and used parts go to www.okiebenz.com
To search list archives http://www.okiebenz.com/archive/
To Unsubscribe or change delivery options go to:
http://okiebenz.com/mailman/listinfo/mercedes_okiebenz.com