Re: Horseman Number 3: Osama Used 40 bits

2002-01-19 Thread Jon Simon
Can anyone else confirm or deny that this is the case? If it is so, it would bring new meaning to the term weak encryption. Thanks, Jon Simon Well, no matter if they used 128 bit encryption. using M$ EFS only is secure from other users. All one has to do is break the Administrator password

RE: Authenticating logos

2002-01-19 Thread Carl Ellison
At 09:59 AM 1/17/2002 +0200, Amir Herzberg wrote: A very important goal of secure commerce is to provide alternate mechanisms in cyberspace. This is since when a hacker is using ATT's logo in her website, it may not be feasible for ATT to sue him (in particular he may reside in places where logos

Re: password-cracking by journalists...

2002-01-19 Thread Sampo Syreeni
On Thu, 17 Jan 2002, Steven M. Bellovin wrote: For one thing, in Hebrew (and, I think, Arabic) vowels are not normally written. If something, this would lead me to believe there is less redundancy in what *is* written, and so less possibility for a dictionary attack. Also, there are a few

I-P: WHY I LOVE BIOMETRICS BY DOROTHY E. DENNING

2002-01-19 Thread R. A. Hettinga
--- begin forwarded text Status: U Date: Fri, 18 Jan 2002 14:30:09 -0500 From: Matthew Gaylor [EMAIL PROTECTED] Subject: I-P: WHY I LOVE BIOMETRICS BY DOROTHY E. DENNING Sender: [EMAIL PROTECTED] Reply-To: Matthew Gaylor [EMAIL PROTECTED]