Helmut Jarausch [EMAIL PROTECTED] at Thursday 31 July 2008,
13:27:24
Hi,
am I doing something wrong?
Whenever I emerge a new sys-libs/timezone-data
I need to do afterwards
rm -f /etc/localtime
ln -s /usr/share/zoneinfo/Europe/Berlin /etc/localtime
(This is with baselayout-2.0.0)
Many
Kevin O'Gorman [EMAIL PROTECTED] at Thursday 24 July 2008, 03:26:26
On Wed, Jul 23, 2008 at 5:06 PM, Volker Armin Hemmann
[EMAIL PROTECTED] wrote:
On Mittwoch, 23. Juli 2008, Kevin O'Gorman wrote:
I run gentoo x86 stable, so that I usually avoid this sort of thing.
This kernel, however,
Dale [EMAIL PROTECTED] at Wednesday 23 July 2008, 19:09:45
Kevin O'Gorman wrote:
I run gentoo x86 stable, so that I usually avoid this sort of thing.
This kernel, however, looks balky to me, because it's reporting
warnings and other oddities during compilation. I don't like warnings
at
James [EMAIL PROTECTED] at Wednesday 23 July 2008, 19:43:16
Hello,
I currently use Korganizer. I was wondering if there is a way to
enhance the calender with know public holidays. For example,
say I wan to get the Holidays for the USA, Canada and Jamaica
onto my KOrganizer?
KOrganizer
Steven Lembark [EMAIL PROTECTED] at Thursday 26 June 2008, 23:52:17
I submit that brute forcing an AES key of reasonably length is
currently impossible in an amount of time that would matter to the
human race.
On average yes.
As already pointed out, however, there is nothing
to
7v5w7go9ub0o [EMAIL PROTECTED] at Friday 27 June 2008, 05:41:15
Chris Walters wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Sorry if this subject has been hashed and rehashed again, but I was
wondering
which Gentoo partition encryption scheme is considered the best, in
kashani [EMAIL PROTECTED] at Friday 27 June 2008, 02:28:21
Here's a reference to the interesting meet-in-the-middle attack which
reduced 3DES key space down to 112 bits from 192.
3DES always had an effective key size of 112 bits, because it uses the
original DES algorithm applied in the
Alan McKinnon [EMAIL PROTECTED] at Thursday 26 June 2008, 10:54:43
The calculation is quite simple - measure how quickly a specific
computer can match keys. Divide this into the size of the keyspace. The
average time to brute force a key is half that value. AFAIK this still
averages out at
Chris Walters [EMAIL PROTECTED] at Wednesday 25 June 2008, 17:14:20
| Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2],
| etc) can break those algorithms relatively easy. On the other hand even
| weaker algorithms can protect your data against laptop thieves.
You had better
Chris Walters [EMAIL PROTECTED] at Wednesday 25 June 2008, 22:25:18
Are you a cryptology expert?
Are you then?
The only thing that cryptography attempts to do is reduce the
**probability** of cracking the key and gaining access to the data as low
as possible.
No news. That's, why
Jason Rivard [EMAIL PROTECTED] at Wednesday 25 June 2008, 23:53:23
The only thing that cryptography attempts to do is reduce the
**probability** of cracking the key and gaining access to the data as
low as possible.
No news. That's, why cryptology defines security not as being
Chris Walters [EMAIL PROTECTED] at Monday 23 June 2008, 17:46:23
Dirk Heinrichs wrote:
| Am Montag, 23. Juni 2008 schrieb ext Chris Walters:
[snip]
| 3. Number and type of ciphers available
|
| Maybe I'm wrong, but the name loop-aes tells this, right? With LUKS,
| one can use (nearly?)
12 matches
Mail list logo