[Info-vax] What to do with my VAX.....

seasoned_geek roland at logikalsolutions.com
Fri Nov 20 07:42:35 EST 2020


On Wednesday, November 11, 2020 at 9:41:08 PM UTC-6, Dave Froble wrote:
> On 11/11/2020 9:12 PM, Bill Gunshannon wrote: 
> > On 11/11/20 8:54 PM, Dave Froble wrote: 
> >> On 11/11/2020 6:56 PM, Alexander Schreiber wrote: 
> >>> seasoned_geek <rol... at logikalsolutions.com> wrote: 
> >> 
> > Guess it depends on which part of ENCRYPTION you are talking about. 
> > The entire algorithm for the Unix Password encryption is documented 
> > and available for anyone who wants to read it. No obscurity involved 
> > at all. Let me know when you figure out how to reverse the encryption 
> > for any password. Brute force doesn't count. 
> > 
> > bill
> But, it would be possible, however very unlikely, to guess? Or is that 
> considered "brute force"?

I prefer reading the yellow sticky stuck to the monitor. Then again, in today's world, you can just breach their Google/Microsoft drive and look for a file named "login-notes.txt" or "account-info.txt" where, by virtue of each and every place having different password rules, now end up keeping login information for all of their accounts.



More information about the Info-vax mailing list