I don't know about anyone else, and despite the fact that any amateur
programmer knows that simply cycling through all the possible combinations
for a password would "eventually" yeild access to the system, I
have no interest in cracking Kevin's password.  That would be rude!!  Show
some F'ing respect!

I do hope that the plex86 project continues...and will happily contribute
as I can.  Ideally, I hope that Kevin Lawton can continue his role as
project leader, but I completely understand that his personal situation
may not allow this.  Alternatively, assuming that some other project
leader were elected/appointed, I would hope that development continued
along lines that would most directly, and equally, address the needs of
the active developers, contributors, and testers of the software.

I realize that I'm a new contributor to this forum, but I have
experienced real-world successes using the Bochs project, and see the
goals of this project as being a potentially enormous leap for open source
software.  I feel compelled to voice my opinion, as I feel I offer a
unique perspective.

Kendell


On Wed, 5 Dec 2001, User1 wrote:

> Someone may wish to send an email directly to Kevin at
> [EMAIL PROTECTED] to ask for CVS write acess.
>
> Otherwise, how many people use this list? We could crack Kevin's password,
> if we could round up enough people, e.g. 100, and if anyone knows the login
> name.
>
> *snicker*
>
> Password cracking works by knowing the login and length of the password (the
> length can be cycled through if it is not known; a minimum and maximum is
> helpful) and then 'counting' through all possible characters. Assumptions
> about all possible characters are usually: no space characters; first,
> assume it has only lowercase letters; then try same thing again with and
> numbers at the end; then same thing with numbers everywhere besides the end;
> repeat with uppercasem mixed too; finally try '!' etc. and allow spaces.
>
> If the allowed characters were just 0 and 1 and the length were 3 then one
> would do this:
>
> 000
>
> Try that password. Then increment the rightmost character:
>
> 001
>
> and again, until it 'overflows'. Then go left one character and repeat until
> the whole thing has overflowed. Stop when the password that was tried works.
>
> *snicker*
>
> ----- Original Message -----
> From: "Kevin Lawton" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Tuesday, December 04, 2001 2:08 PM
> Subject: Re: [plex86] bochs 1.3 --> plex86?
>
>
> >
> > --- "Dr. Yasha Karant" <[EMAIL PROTECTED]> wrote:
> > > Plex86 is a fine starting point.  I am not a JD and have not
> > > read the existing license in full detail -- is the existing
> > > license GPL or FreeBSD or are there specific restrictive covenants?
> > >
> > > I ask this because Plex86 was being funded by a commercial vendor
> > > until such time as Kevin was terminated, and Bochs was intended
> > > as a part of Kevin's livelihood if I correctly recall previous emails
> > > with him.
> >
> > Let's see, might as well do some wholesale answering.
> >
> > Plex86 is LGPL since we decided on a license in the
> > beginning.  Bochs has been LGPL'd for some time now.
> >
> > I still haven't decided what I want to do next.  I plan
> > to take as much time as needed.
> >
> > What else...yes Mandrake did fund me while I worked on Plex86.
> >
> > Bochs was previously a commercial license, but developed
> > in the open.  This did enable me to pay the rent while I
> > worked on it, indeed a big help.  People still contributed
> > anyways.  This licensing arrangement frustrated RMS
> > who likes to see in B&W.  But I have to hand it to
> > many good people who helped, and who recognized shades
> > of grey.
> >
> > Anyways, I'm working on neither at the moment.  Back
> > to my regularly scheduled program...
> >
> >
> > -Kevin
> >
> > __________________________________________________
> > Do You Yahoo!?
> > Buy the perfect holiday gifts at Yahoo! Shopping.
> > http://shopping.yahoo.com
> >
> >
>


Reply via email to