delorie.com/archives/browse.cgi   search  
Mail Archives: cygwin/2005/12/06/16:39:10

X-Spam-Check-By: sourceware.org
X-ORBL: [70.240.14.68]
Date: Tue, 6 Dec 2005 15:36:37 -0600
From: Wayne Willcox <wayne AT reliant DOT immure DOT com>
To: cygwin AT cygwin DOT com
Subject: Re: encoding scripts (so that user can't see passwords easily)?
Message-ID: <20051206153637.A4584@reliant.immure.com>
Reply-To: Wayne Willcox <wayne AT reliant DOT immure DOT com>
References: <20051204173646 DOT GA28855 AT trixie DOT casa DOT cgf DOT cx> <deca9ec80512042242h44317cexf2878291acddcc8a AT mail DOT gmail DOT com> <7ff9c2a10512060949l72e9693bv251e0d46c36ea0e0 AT mail DOT gmail DOT com> <4395E827 DOT 4070804 AT wpkg DOT org> <61f6f4390512061158o5a2ef71by6e1a419c8e6499b3 AT mail DOT gmail DOT com> <20051206140214 DOT A4275 AT reliant DOT immure DOT com> <4395F187 DOT 2020908 AT wpkg DOT org> <Pine DOT GSO DOT 4 DOT 63 DOT 0512061540330 DOT 35 AT slinky DOT cs DOT nyu DOT edu> <61f6f4390512061320s512a55e8n84f27e486db0596 AT mail DOT gmail DOT com> <43960252 DOT 9010106 AT wpkg DOT org>
Mime-Version: 1.0
User-Agent: Mutt/1.2.5i
In-Reply-To: <43960252.9010106@wpkg.org>; from mangoo@wpkg.org on Tue, Dec 06, 2005 at 10:27:46PM +0100
X-Operating-System: FreeBSD reliant.immure.com 4.4-RELEASE FreeBSD 4.4-RELEASE
X-IsSubscribed: yes
Mailing-List: contact cygwin-help AT cygwin DOT com; run by ezmlm
List-Unsubscribe: <mailto:cygwin-unsubscribe-archive-cygwin=delorie DOT com AT cygwin DOT com>
List-Subscribe: <mailto:cygwin-subscribe AT cygwin DOT com>
List-Archive: <http://sourceware.org/ml/cygwin/>
List-Post: <mailto:cygwin AT cygwin DOT com>
List-Help: <mailto:cygwin-help AT cygwin DOT com>, <http://sourceware.org/ml/#faqs>
Sender: cygwin-owner AT cygwin DOT com
Mail-Followup-To: cygwin AT cygwin DOT com
Delivered-To: mailing list cygwin AT cygwin DOT com

I view disk data encryption sort of like locking your car doors.  If they want
your car all they really need is a pickup truck and a car tow kit. If someone
really wants to get to your data they will.  The question is how badly do
they want that data?  How much effort will the expend to get it?  Lastly
if you catch them and take them to court can you prove that you did everything
resonable to try and prevent the thift?


On Tue, Dec 06, 2005 at 10:27:46PM +0100, Tomasz Chmielewski wrote:
> Jim Drash schrieb:
> > If someone can get physical access to the disk, then there is not a
> > single thing you can do to stop someone who is:
> > 
> > 1) Knowledgeable
> > 2) Determined
> > 3) has time
> > 4) is a criminal
> 
> But I could certainly stop someone who is *not* knowledgeable nor 
> determined, and his "criminal cracking" gnowledge ends when he presses 
> Enter after typing "grep -r password /".
> 
> Why do you think mail clients, web browsers and other software don't 
> store the passwords in plain?
> 
> 
> 
> -- 
> Tomek
> http://wpkg.org
> WPKG - software deployment and upgrades with Samba
> 
> 
> --
> Unsubscribe info:      http://cygwin.com/ml/#unsubscribe-simple
> Problem reports:       http://cygwin.com/problems.html
> Documentation:         http://cygwin.com/docs.html
> FAQ:                   http://cygwin.com/faq/

-- 
Slowly and surely the unix crept up on the Nintendo user ...
Wayne Willcox                          I will not eat green eggs and ham
wayne AT reliant DOT immure DOT com                     I will not eat them Sam I Am!!
A wise person makes his own decisions, a weak one obeys public opinion.
                -- Chinese proverb

--
Unsubscribe info:      http://cygwin.com/ml/#unsubscribe-simple
Problem reports:       http://cygwin.com/problems.html
Documentation:         http://cygwin.com/docs.html
FAQ:                   http://cygwin.com/faq/

- Raw text -


  webmaster     delorie software   privacy  
  Copyright © 2019   by DJ Delorie     Updated Jul 2019