Ehud Karni wrote:
> [I think this discussion is off topic for cygwin]
Agreed, which is why I didn't elucidate earlier. If I
were inclined to do something like your second script
and override normal passphrase security, I'd probably
use another mechanism (maybe an environment variable?)
to avoid th
Ehud Karni wrote:
> On Tue, 06 Dec 2005 20:36:07 +0100, Tomasz Chmielewski wrote:
>>
>> It is to be a measure to prevent an accidental viewing of
>> usernames/passwords rather than some "military grade" tool which
>> takes 100 years to break on a supercomputer.
>
> [I think this discussion is off
On Tue, 06 Dec 2005 20:36:07 +0100, Tomasz Chmielewski wrote:
>
> It is to be a measure to prevent an accidental viewing of
> usernames/passwords rather than some "military grade" tool which takes
> 100 years to break on a supercomputer.
[I think this discussion is off topic for cygwin]
Here are
Igor Pechtchanski wrote:
> On Tue, 6 Dec 2005, Tomasz Chmielewski wrote:
>> But I don't really know where to start (which tool should I use for
>> it?)
>
> Umm, "crypt"?
Or better yet, ccrypt. Check its manpage.
gsw
--
Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple
Problem re
Can you make it harder? Yes. I can think of lots of ways to make it
harder. The easiest is to prompt them for the userid and passwords
that they need when they need them and don't store them at all.
On 12/6/05, Tomasz Chmielewski <[EMAIL PROTECTED]> wrote:
> Jim Drash schrieb:
> > If someone can
I view disk data encryption sort of like locking your car doors. If they want
your car all they really need is a pickup truck and a car tow kit. If someone
really wants to get to your data they will. The question is how badly do
they want that data? How much effort will the expend to get it? La
Jim Drash schrieb:
If someone can get physical access to the disk, then there is not a
single thing you can do to stop someone who is:
1) Knowledgeable
2) Determined
3) has time
4) is a criminal
But I could certainly stop someone who is *not* knowledgeable nor
determined, and his "criminal cr
If someone can get physical access to the disk, then there is not a
single thing you can do to stop someone who is:
1) Knowledgeable
2) Determined
3) has time
4) is a criminal
Nothing can stop them, The best you can do is slow them down, know
that it is happening maybe while it is happening or wo
On Tue, 6 Dec 2005, Tomasz Chmielewski wrote:
> Wayne Willcox schrieb:
>
> > On Tue, Dec 06, 2005 at 02:58:15PM -0500, Jim Drash wrote:
> >
> > > Don't put the user names or passwords in the script put them in a file
> > > only readable by SYSTEM
>
> > that would not solve the requirement of prote
Tomasz Chmielewski wrote:
> That's exactly what I mean (they are already readable by SYSTEM and
> admins only).
>
> If the disk is stolen, it would add some extra time before the password
> is compromised.
>
> Someone gave a clue here:
>
> http://cygwin.com/ml/cygwin/2005-12/msg00181.html
>
>
Wayne Willcox schrieb:
On Tue, Dec 06, 2005 at 02:58:15PM -0500, Jim Drash wrote:
Don't put the user names or passwords in the script put them in a file
only readable by SYSTEM
> that would not solve the requirement of protecting the passwords
> if the disk was stolen. The scripts are suppo
that would not solve the requirement of protecting the passwords
if the disk was stolen. The scripts are supposedly already
readable by system and admin only.
On Tue, Dec 06, 2005 at 02:58:15PM -0500, Jim Drash wrote:
> Don't put the user names or passwords in the script put them in a file
> only
Don't put the user names or passwords in the script put them in a file
only readable by SYSTEM
On 12/6/05, Tomasz Chmielewski <[EMAIL PROTECTED]> wrote:
> Svend Sorensen schrieb:
> > On 12/4/05, nidhog <[EMAIL PROTECTED]> wrote:
> >
> >>On 12/4/05, Christopher Faylor <[EMAIL PROTECTED]> wrote:
>
On Tue, Dec 06, 2005 at 08:36:07PM +0100, Tomasz Chmielewski wrote:
>Svend Sorensen schrieb:
>>On 12/4/05, nidhog <[EMAIL PROTECTED]> wrote:
>>
>>>On 12/4/05, Christopher Faylor <[EMAIL PROTECTED]>
>>>wrote:
>>>
On Sun, Dec 04, 2005 at 12:20:57PM +0100, Tomasz Chmielewski wrote:
>I ha
Svend Sorensen schrieb:
On 12/4/05, nidhog <[EMAIL PROTECTED]> wrote:
On 12/4/05, Christopher Faylor <[EMAIL PROTECTED]> wrote:
On Sun, Dec 04, 2005 at 12:20:57PM +0100, Tomasz Chmielewski wrote:
I have a little open-source project, which eases Windows administration
a bit.
In some of the
On 12/4/05, nidhog <[EMAIL PROTECTED]> wrote:
> On 12/4/05, Christopher Faylor <[EMAIL PROTECTED]> wrote:
> > On Sun, Dec 04, 2005 at 12:20:57PM +0100, Tomasz Chmielewski wrote:
> > >I have a little open-source project, which eases Windows administration
> > >a bit.
> > >
> > >In some of the script
Christopher Faylor schrieb:
On Sun, Dec 04, 2005 at 12:20:57PM +0100, Tomasz Chmielewski wrote:
I have a little open-source project, which eases Windows administration
a bit.
In some of the scripts, I use usernames and passwords (to get to a
password-protected network share etc.).
Because t
On 12/4/05, Christopher Faylor <[EMAIL PROTECTED]> wrote:
> On Sun, Dec 04, 2005 at 12:20:57PM +0100, Tomasz Chmielewski wrote:
> >I have a little open-source project, which eases Windows administration
> >a bit.
> >
> >In some of the scripts, I use usernames and passwords (to get to a
> >password-
On Sun, Dec 04, 2005 at 12:20:57PM +0100, Tomasz Chmielewski wrote:
>I have a little open-source project, which eases Windows administration
>a bit.
>
>In some of the scripts, I use usernames and passwords (to get to a
>password-protected network share etc.).
>Because they are scripts, username a
19 matches
Mail list logo