On Mon, 9 Sep 2002, WC -Sx- Jones wrote: > > Given: fcjjf1CkQsV1IFCCJ25145245 > > Can you devise a way to break the code? Years ago (1997) I wrote an > H/R jobs posting script which is now coming under fire (people are > saying that because I send the security bits back and forth between the > client and the server that someone can hack into the script and fiddle > with the program.) > > What do you think? I would give you a better hint, but this is all a > hacker would have to go on...
Can you provide us a test server to feed our own input to? And a test client to observe? Seriously, your protocol might well be secure, or at least secure enough for the job it's doing. But we can't tell from that sample. (Or, if we could, it definitely wouldn't be secure by any standards.) -- Ilmari Karonen - http://www.sci.fi/~iltzu/ "We have argued that unskilled individuals suffer a dual burden: Not only do they perform poorly, but they fail to realize it. It ... appears that extremely competent individuals suffer a burden as well. Although they perform competently, they fail to realize that their proficiency is not necessarily shared by their peers." -- http://www.apa.org/journals/psp/psp7761121.html