Beefy Boxes and Bandwidth Generously Provided by pair Networks
Don't ask to ask, just ask

Re^8: Authentication with /etc/shadow

by fluffyvoidwarrior (Monk)
on Feb 27, 2011 at 14:27 UTC ( #890422=note: print w/replies, xml ) Need Help??

in reply to Re^7: Authentication with /etc/shadow
in thread Authentication with /etc/shadow

Yes, exactly. But they see big fat dollar signs. Every day wasted loses them more than I earn in a year and if a competitor beats them to it they'll be jumping off ledges.

So do you think I have a chance of beefing up the perlapps a bit?

I personally have never really considered how to crack a perlapp and maybe that's the question I should have asked.

It seems to me that the crux is likely to be - Does the perlapp need to be run to be cracked (I'm assuming yes) and if it does will it be run and controlled or run and observed. If the instructions are encountered sequentially and observed then I have a chance of making a right pain in the *** of myself for any attacker. If it is not processed sequentially or is stepped through like a debugger - under human control - I am probably powerless to hinder them more than once, if that much.

What I really need is another month but it isn't going to happen.

Replies are listed 'Best First'.
Re^9: Authentication with /etc/shadow
by Anonymous Monk on Feb 27, 2011 at 14:36 UTC
      I can spend a day or so on this then I'll have to move on.

      But, as you suggested, I will make sure they fully understand what they are making me do and what the consequences could be.

      It's their choice.

Log In?

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://890422]
and all is quiet...

How do I use this? | Other CB clients
Other Users?
Others browsing the Monastery: (5)
As of 2018-03-18 20:58 GMT
Find Nodes?
    Voting Booth?
    When I think of a mole I think of:

    Results (230 votes). Check out past polls.