steve miller wrote:
The person passing the task to me is an IT person who is in charge of all security issues at the company, and he is usually very strict about confidentiality and legality. He also has all of the plain text versions of the passwords as well as the encrypted versions.


If you already have the plain text passwords why do you need to break the encryption? Just use them to populate a parallel login table for the new application.

--
Sheila
http://www.shefen.com/

____ • The WDVL Discussion List from WDVL.COM • ____
To Join wdvltalk, Send An Email To: mailto:[EMAIL PROTECTED] or
use the web interface http://e-newsletters.internet.com/discussionlists.html/
      Send Your Posts To: wdvltalk@lists.wdvl.com
To change subscription settings, add a password or view the web interface:
http://intm-dl.sparklist.com/read/?forum=wdvltalk

________________  http://www.wdvl.com  _______________________

You are currently subscribed to wdvltalk as: [EMAIL PROTECTED]
To unsubscribe send a blank email to [EMAIL PROTECTED]
To unsubscribe via postal mail, please contact us at:
Jupitermedia Corp.
Attn: Discussion List Management
475 Park Avenue South
New York, NY 10016

Please include the email address which you have been contacted with.

Reply via email to