Most common encryption algorithms are well known and documented. It isn't knowing how a code is generated with modern encryption, it is the number of permutations that are available that makes them hard to break (well until they get the molecular pairing worked out).

You can break any individual key if you have the time and the system lets you keep trying. You just may need a lifetime to do it.

In general it is much easier to target known user weaknesses and spend the time researching the staff/building security/remote access systems that it is to try to break one code.

--
Michael Hawksworth
Visual Fox Solutions

[EMAIL PROTECTED]
www.foxpro.co.uk





_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://leafe.com/mailman/listinfo/profox
OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to