From: “Carlos L. Mariscal” <clopez@nayar.uan.mx>
To: William Ono <wmono@Direct.CA>
Message Hash: 86f1369f1a5c9f18c1f769b2388e6031dfc135d9a218ea6d85fcf2976bdbd6b1
Message ID: <Pine.SUN.3.91.960817120330.9586A-100000@aramara.uan.mx>
Reply To: <Pine.LNX.3.94.960817000216.1458B-100000@crash.direct.ca>
UTC Datetime: 1996-08-17 19:58:18 UTC
Raw Date: Sun, 18 Aug 1996 03:58:18 +0800
From: "Carlos L. Mariscal" <clopez@nayar.uan.mx>
Date: Sun, 18 Aug 1996 03:58:18 +0800
To: William Ono <wmono@Direct.CA>
Subject: Re: Unix passwd-cracker online?
In-Reply-To: <Pine.LNX.3.94.960817000216.1458B-100000@crash.direct.ca>
Message-ID: <Pine.SUN.3.91.960817120330.9586A-100000@aramara.uan.mx>
MIME-Version: 1.0
Content-Type: text/plain
Well, as for William's calculations, my ideas have been
confirmed. What I still think may be possible is a fast search on
/etc/passwd for blank entries or Obvious (login name, reverse login name,
etc) password entries, right? Still, ik think it would be fairly illegal;
not assuming EVERYthing on the net is 100% legal...
thanx Will
__
||
==== 'If you can dream of it
| |__ then you can manage it'
| |-.\
|__| \\ clopez@nayar.uan.mx
|| ||
======__|
________||__
/____________\ Carlos L. Mariscal
Return to August 1996
Return to “William Ono <wmono@Direct.CA>”