From: Jonathan Cooper <entropy@IntNet.net>
To: “Perry E. Metzger” <perry@imsi.com>
Message Hash: c3fe7a7f8a48fbdabaa200b801981978359a3fa0f7ffb772840de002db42a6b4
Message ID: <Pine.SV4.3.91.941224100415.22880E-100000@xcalibur>
Reply To: <9412232026.AA22580@webster.imsi.com>
UTC Datetime: 1994-12-24 15:15:17 UTC
Raw Date: Sat, 24 Dec 94 07:15:17 PST
From: Jonathan Cooper <entropy@IntNet.net>
Date: Sat, 24 Dec 94 07:15:17 PST
To: "Perry E. Metzger" <perry@imsi.com>
Subject: Re: reading someone's files
In-Reply-To: <9412232026.AA22580@webster.imsi.com>
Message-ID: <Pine.SV4.3.91.941224100415.22880E-100000@xcalibur>
MIME-Version: 1.0
Content-Type: text/plain
> I'm suprised that no one has given the obvious answers on this
> topic. If you have physical access to someone's machine, it is trivial
> to find out what their encryption keys are. After all, the victim
> types into the machine regularly -- recording all their keystrokes is
> not a difficult matter at all.
Indeed. Archie for DEPL.ZIP or DEPLSRC.ZIP - the program is called
Delam's Elite Password Leecher (sic) and will do exactly this task. Also
you could write a 5 minute TSR in the language of your choice to hook
interrupt 9 and write to a logfile; examples of this are all over the
net. If you must, post to alt.2600 asking for one, and 18,000 k0de
k1ddies will mail you back uu'd copies.
-jon
( --------[ Jonathan D. Cooper ]--------[ entropy@intnet.net ]-------- )
( PGP 2.6.2 keyprint: 31 50 8F 82 B9 79 ED C4 5B 12 A0 35 E0 9B C0 01 )
( home page: http://hyperreal.com/~entropy/ ]-------[ Key-ID: 4082CCB5 )
Return to December 1994
Return to “perry@imsi.com (Perry E. Metzger)”