Berkeley CSUA MOTD:Entry 14328
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/04/03 [General] UID:1000 Activity:popular
4/3     

1998/7/14 [Computer/SW/Security] UID:14328 Activity:high
7/13    http://www.distributed.net/des crack the Data Encryption Standard
        using idle time on your computer, prove it's inadequate.
        \_ get a life.
           \_ Oh SURE . . . you say that now, but wait until 3:30 AM on that
              fine Sunday morning, when the black helicopters hover over your
              house, and the black ropes come out, and zombie Nazi mind-slaves
              (vat-grown by the UN) wearing black body armor rappel down them
              to burst through your front door and kill you and the wife and
              little Timmy, ALL BECAUSE THAT E-MAIL TO GRANDMA FLO AND
              GRANDPA MEL ABOUT LITTLE TIMMY'S SOCCER GAME LAST WEDNESDAY
              used WEAK DES ENCRYPTION . . . don't expect me to cry for you
              _then_.  Bastard.
                \_ We don't work on Sundays.  -Black Mask Man
           \_ Why do you not like announcements of techie stuff?  This IS the
              "Computer Science" Undergraduate Association, is it not?
                \_ "using idle time on your computer [soda]"....
                        \_ soda is not your computer
                                \_ soda is our computer.  keep this stupid
                                   crap off.
                                   crap off.  It's already well known that
                                   DES is inadequate.  It's been proved.
                                   This is nothing more than a GeekEgo thing.
                   \_ Don't do that, then.
           \_ Think of it this way.  You get $$$ if you personally break
              it.  Of course, people who do CS only for that reason
              deserve to be shot.
              \_ That's not CS, it's CE.
                \_ It's not even CE.  It's running a black-box program on your
                   computer.
              \_ There are other reasons to do it money: curiosity, politics.
        \_ Is there a Cal team this time?  -- yuen
           \_ Not unless I hear a lot of interest or unless the RC5 teams carry
              over.  Or ask Trey (rhyde@uclink4) if he wants to take it over
              again.  This contest is supposed to end in 9 days; it's not worth
              doing a lot of organizational work for something that's gone a
              week after you start. -- schoen, inheritor of UCB RC5 team contact
2025/04/03 [General] UID:1000 Activity:popular
4/3     

You may also be interested in these entries...
2010/3/9-30 [Computer/HW/CPU, Computer/SW] UID:53748 Activity:nil
3/9     http://www.engadget.com/2010/03/09/1024-bit-rsa-encryption-cracked-by-carefully-starving-cpu-of-ele
        I failed to see why you must starve the CPU of electricity. Why
        can't you just simulate that in software?
        \_ And if you can simulate that in software, why not just single-
           stepping the simulated CPU and get the key out?
	...
2009/12/29-2010/1/19 [Computer/SW/Security] UID:53607 Activity:nil
12/29   Sounds like the GSM encryption key has been recovered via a
        brute force attack:
        http://www.nytimes.com/2009/12/29/technology/29hack.html
	...
2008/8/5-10 [Computer/HW/Laptop] UID:50783 Activity:nil
8/5     Laptop with names of 33K people in the 'Clear' program stolen.  Data
        was (of course) unencrypted.
        http://www.schneier.com/blog/archives/2008/08/laptop_with_tru.html
        \_ http://news.yahoo.com/s/nm/20080805/bs_nm/tjx_theft_charges_dc
           When are people going to learn to encrypt sensitive data?
           \_ When encryption becomes transparent enough that noone has
	...
2008/6/25-7/14 [Computer/SW/Security] UID:50380 Activity:nil
6/25    some XCF or CSUA person had a web page about a project they were
        working on where I set up a machine, and you set up a machine
        somewhere, and they both passively back each other, i believe with
        an encryption key so i can't read your backups.  when your disk
        catches on fire, i just give you a copy of your data.  anyone remember
        the name of this?
	...
2008/6/9-12 [Computer/SW/Languages/C_Cplusplus, Computer/SW/Security] UID:50194 Activity:nil
6/8     CSUA code guru please help. I need to see my random number
        generator with a good seed (I just need random 18 bit
        identifiers). The usual time(NULL) is OK, except my program
        might be invoked faster than once a second, and seeding using
        time() produced the same result. I tried clock() but it seems
        to return 0. My program needs to be run in Linux/DOS (Watcom
	...
2008/4/21-5/2 [Computer/SW/Security] UID:49787 Activity:nil
4/21    Yahoo Instant Messenger is not encrypted. Are there chat programs
        that are a bit more secure than YIM?
        \_ what OS are you using?
        \_ What are your goals? Corporate security, or preventing your wife
           from eavesdropping on you? If you're using IM for internal company
           communication, you shouldn't be using anything where you don't
	...
2008/2/21-25 [Computer/HW/Memory, Computer/SW/Security] UID:49208 Activity:nil
2/21    Cold Boot Attacks Against Disk Encryption:
        http://www.schneier.com/blog/archives/2008/02/cold_boot_attac.html
        http://citp.princeton.edu/memory
	...
2006/10/27-30 [Computer/SW/Security] UID:45013 Activity:low
10/27   Anybody tried the "PDF decryptor" or "PDF password delete" type of
        software?  I have a PDF form file that won't let me save.  I'm
        considering getting one of those type of software to unlock the
        file.  I really don't want to pay to try it out though.  Are there
        free open source PDF unlock programs?  Thanks.
        \_ I've used Elcomsoft's (of "Free Dmitry Sklyarov!" fame) PDF
	...
2006/8/22-23 [Computer/SW/Security] UID:44096 Activity:high
8/22    In Windoze XP, how can I make my service start automatically when it
        boots up in Safe Mode?  I searched MSDN site and didn't see anything.
        Thanks.
        \_ I don't know how to do that in Windoze XP but it isn't that hard in
           Windows XP.
           \_ And that would be how?  Thx.
	...
2006/8/12-14 [Computer/SW/Security] UID:43984 Activity:nil
8/12    Anybody know of a good backup solution for PGP encrypted disks?
        The way I've been backing up is to make copies of the .pgd file
        with dates in the filename.  This method is not very scalable as my
        .pgd files are becoming gigabytes in size.  Anybody know
        of an integrated solution to backups and encrypted folders/disks?
        OS X Leopard "time machine" backup feature looks interesting.  But
	...
Cache (1069 bytes)
www.distributed.net/des -> www.distributed.net/des/
DES-III ended with success on January 19, 1999 at 7am PST. You may also view some 30 Final Contest Graph Statistics. Additionally, RSA placed strict time limits on the challenge. When the client program ran, computers were assigned a block of work to test and determine if a solution was found. With this system, the more computers we had working together, the faster the combined effort would be. Any machine with a reliable connection to the Internet was usable for our purposes. If you want to find out more about this past DES contest, you may want to check out these sites: * 32 The RSA DES-III Official Project Web page * 33 SSLeay and SSLapps FAQ * 34 DES algorithm details * 35 BrydDES other past des contests The original 36 DES-I contest was completed on 17-Jun-1997 by Rocke Verser's collaborated effort. Read our winning announcements from 38 Nugget and 39 Duncan about the last DES-II-1 contest. Or take a look at the 40 List Announcement of the DES-II-1 project completion. You can view a number of 42 news articles relating to the EFF project completion.