OZONE Asylum
Forums
OZONE
Let's talk about computer security for a moment
This page's ID:
27664
Search
QuickChanges
Forums
FAQ
Archives
Register
Edit Post
Who can edit a post?
The poster and administrators may edit a post. The poster can only edit it for a short while after the initial post.
Your User Name:
Your Password:
Login Options:
Remember Me On This Computer
Your Text:
Insert Slimies »
Insert UBB Code »
Close
Last Tag
|
All Tags
UBB Help
[url=http://www.google.com/search?hl=fr&rls=GGLG%2CGGLG%3A2006-10%2CGGLG%3Afr&q=wpa+exploit&lr=]google: wpa+exploit[/url] Perfect security does not exist. Close a gap, and you'll most likely change the whole balance of an app enough to open a new hole somewhere else. I have to add that this is theory, and does not apply only to computers, but also to real world security. Still, any encryption can be decrypted, the question is: how long would it take? Which processing power is required? But most of the time, decrypting anything that travels on networks is not needed: you can get the clear version by abusing a flaw. [small](Edited by [url=http://www.ozoneasylum.com/user/5827]_Mauro[/url] on 03-25-2006 20:14)[/small]
Loading...
Options:
Enable Slimies
Enable Linkwords
« Backwards
—
Onwards »