http://www.perlmonks.org?node_id=890422


in reply to Re^7: Authentication with /etc/shadow
in thread Authentication with /etc/shadow

Yes, exactly. But they see big fat dollar signs. Every day wasted loses them more than I earn in a year and if a competitor beats them to it they'll be jumping off ledges.

So do you think I have a chance of beefing up the perlapps a bit?

I personally have never really considered how to crack a perlapp and maybe that's the question I should have asked.

It seems to me that the crux is likely to be - Does the perlapp need to be run to be cracked (I'm assuming yes) and if it does will it be run and controlled or run and observed. If the instructions are encountered sequentially and observed then I have a chance of making a right pain in the *** of myself for any attacker. If it is not processed sequentially or is stepped through like a debugger - under human control - I am probably powerless to hinder them more than once, if that much.

What I really need is another month but it isn't going to happen.

Replies are listed 'Best First'.
Re^9: Authentication with /etc/shadow
by Anonymous Monk on Feb 27, 2011 at 14:36 UTC
      Thanks.
      I can spend a day or so on this then I'll have to move on.

      But, as you suggested, I will make sure they fully understand what they are making me do and what the consequences could be.

      It's their choice.