[55261] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Banc of America Article

daemon@ATHENA.MIT.EDU (E.B. Dreger)
Sun Jan 26 00:35:43 2003

Date: Sun, 26 Jan 2003 05:33:57 +0000 (GMT)
From: "E.B. Dreger" <eddy+public+spam@noc.everquick.net>
To: "nanog@nanog.org" <nanog@nanog.org>
In-Reply-To: <Pine.WNT.4.43.0301260021180.2284-100000@TEMPEST.hq.nac.net>
Errors-To: owner-nanog-outgoing@merit.edu


AR> Date: Sun, 26 Jan 2003 00:22:02 -0500 (Eastern Standard Time)
AR> From: Alex Rubenstein


AR> Agreed. And, even if it is super encrypted, who cares? Enough
AR> CPU and time will take care of that.

Articles about "1000 years to crack using brute force" are a bit
disconcerting if someone has access to 10,000x compromised hosts.
While we're on the subject: root certificates, anybody?

Each worm seems to prove the availability of CPU and time.


Eddy
--
Brotsman & Dreger, Inc. - EverQuick Internet Division
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 (785) 865-5885 Lawrence and [inter]national
Phone: +1 (316) 794-8922 Wichita

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Mon, 21 May 2001 11:23:58 +0000 (GMT)
From: A Trap <blacklist@brics.com>
To: blacklist@brics.com
Subject: Please ignore this portion of my mail signature.

These last few lines are a trap for address-harvesting spambots.
Do NOT send mail to <blacklist@brics.com>, or you are likely to
be blocked.


home help back first fref pref prev next nref lref last post