On May 14, Michael Sh ([EMAIL PROTECTED]) wrote:
> Hi,
>
> For reasons of nostalgia, I went looking for a DEC VAX machine, and ended
> up with a few DEC Alpha's. (2) servers (an EB64+ and a PC164LX), a DEC
> 3100 workstation (3000/300L), and a DEC Multia UDB (sort of an early
> version of a
On Sun, May 15, 2005 at 01:07:36AM -0400, [EMAIL PROTECTED] wrote:
> [EMAIL PROTECTED] dd if=/dev/urandom bs=1 count=64 | ./string2dec.pl |
> ./dec2base95.pl
> 64+0 records in
> 64+0 records out
> 64 bytes transferred in 0.001558 seconds (41076 bytes/sec)
> Bm ?n`zp>4R>f4fC\>>u*HCkHRp*%%%Ha>M\/WW
Date: Sat, 14 May 2005 22:58:29 -0400
From: mike ledoux <[EMAIL PROTECTED]>
On Sat, May 14, 2005 at 10:39:44PM -0400, mike ledoux wrote:
> On Sat, May 14, 2005 at 07:50:14PM -0400, [EMAIL PROTECTED] wrote:
> > I just discovered something VERY DISTURBING about /dev/{u,}random in
>
Greetings,
I just discovered something VERY DISTURBING about /dev/{u,}random in
Linux Despite what the man page for urandom says, the data from
/dev/random is REALLY not very random at all. Many googleable pages
on entropy gathering will tell you what the man page says: that
/dev/random wil
On May 14, 2005, at 16:38, Fred wrote:
A backdoor could very
easily be hidden in the encryption algorithms to a degree it would be
almost impossible to detect.
SELinux is a system-level ACL implementation - I wasn't aware it used
encryption to enforce access control. You'd have to have something
Hi,
For reasons of nostalgia, I went looking for a DEC VAX machine, and ended up
with a few DEC Alpha's. (2) servers (an EB64+ and a PC164LX), a DEC 3100
workstation (3000/300L), and a DEC Multia UDB (sort of an early version of a
micro-box)... One will run OpenVMS (also for nostalgia purpose