[Info-vax] What to do with my VAX.....
seasoned_geek
roland at logikalsolutions.com
Fri Nov 20 07:42:35 EST 2020
On Wednesday, November 11, 2020 at 9:41:08 PM UTC-6, Dave Froble wrote:
> On 11/11/2020 9:12 PM, Bill Gunshannon wrote:
> > On 11/11/20 8:54 PM, Dave Froble wrote:
> >> On 11/11/2020 6:56 PM, Alexander Schreiber wrote:
> >>> seasoned_geek <rol... at logikalsolutions.com> wrote:
> >>
> > Guess it depends on which part of ENCRYPTION you are talking about.
> > The entire algorithm for the Unix Password encryption is documented
> > and available for anyone who wants to read it. No obscurity involved
> > at all. Let me know when you figure out how to reverse the encryption
> > for any password. Brute force doesn't count.
> >
> > bill
> But, it would be possible, however very unlikely, to guess? Or is that
> considered "brute force"?
I prefer reading the yellow sticky stuck to the monitor. Then again, in today's world, you can just breach their Google/Microsoft drive and look for a file named "login-notes.txt" or "account-info.txt" where, by virtue of each and every place having different password rules, now end up keeping login information for all of their accounts.
More information about the Info-vax
mailing list