On Fri, Sep 14, 2001 at 06:37:17PM -0700, Rick Moen wrote:
> And, when all else fails, the bad guys can always fall back on "lead
> pipe decryption". ;->
Wouldn't lead pipe decryption be a bit, um, tricky? That is, if you
try to (ahem) decrypt something just a little bit too hard with the
lead pipe they have an annoying habit of becoming, uh, permanently
encrypted? Perhaps this algorithm just isn't amenable to brute force
decryption? what sort of length do you suggest for the decryption `key'?
Maintained by the ILUG website team. The aim of Linux.ie is to
support and help commercial and private users of Linux in Ireland. You can
display ILUG news in your own webpages, read backend
information to find out how. Networking services kindly provided by HEAnet, server kindly donated by
Dell. Linux is a trademark of Linus Torvalds,
used with permission. No penguins were harmed in the production or maintenance
of this highly praised website. Looking for the
Indian Linux Users' Group? Try here. If you've read all this and aren't a lawyer: you should be!