From: jwa@nbs.nau.edu (James W. Abendschan)
To: cypherpunks@toad.com
Message Hash: 1d346e3b56029bc439df3eb168ad00cadf04c1ffe65fca15319b76582cfc238b
Message ID: <199601191805.LAA16786@ecosys.nbs.nau.edu>
Reply To: <vznuri@netcom.com>
UTC Datetime: 1996-01-19 18:21:21 UTC
Raw Date: Sat, 20 Jan 1996 02:21:21 +0800
From: jwa@nbs.nau.edu (James W. Abendschan)
Date: Sat, 20 Jan 1996 02:21:21 +0800
To: cypherpunks@toad.com
Subject: Re: "cybertage"
In-Reply-To: <vznuri@netcom.com>
Message-ID: <199601191805.LAA16786@ecosys.nbs.nau.edu>
MIME-Version: 1.0
Content-Type: text/plain
Way back on Jan 19, 9:22am, "Vladimir Z. Nuri" wrote:
> how about a new term for all the various enemies of cyberspatial
> advancement? the censors, the luddites, the spooks, the politicians,
> the demagogues, the rabid media (all of which there seems to be no
> shortage of lately):
>
> "cyberteurs" engaging in "cybertage"
Augh! No! No more "cyber" anything, please! Instead, how about
a filter (implemented at some key top-level, NSA-funded routers,
of course) that simply s/cyber//g ?
- - -
How "tight" is the encryption that ssh (secure shell) uses? I'm
trying to push it for use across potentially insecure subnets
at our University, and would like all the ammo I can get :)
Has anyone tried to sniff & brute force a ssh-encrypted session?
James
--
James W. Abendschan Email: jwa@nbs.nau.edu
UNIX Systems Programmer/Administrator Voice: (520) 556-7466
Colorado Plateau Research Station, Flagstaff, AZ FAX: (520) 556-7500
Return to January 1996
Return to “jwa@nbs.nau.edu (James W. Abendschan)”
Unknown thread root