Marcos el Ruptor wrote:
I've just looked at the virus.
Just curious -- where were you able to download the virus from?
-James
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL
On 12 Jun 2008, at 03:05, James Muir wrote:
Just curious -- where were you able to download the virus from?
www.offensivecomputing.net
Just be careful. Do not run it. It does not spread itself, but it
will encrypt all the sensitive files on all the drives and then self-
destruct. If you
I would expect hardware designs to be treated more like hardware than
software.
/r$
--
STSM, DataPower Chief Programmer
WebSphere DataPower SOA Appliances
http://www.ibm.com/software/integration/datapower/
-
The
I would expect hardware designs to be treated more like hardware than
software.
A hardware design is not hardware. Only a naive parsing of the
words would treat it so. A software design is not treated like
software; you are free to write about how ATM machine crypto is
designed, even if you
If only to make sure that there's no confusion about where I stand: I
agree with you completely John. I am not surprised that the feds or Sun
see it otherwise.
/r$
--
STSM, DataPower Chief Programmer
WebSphere DataPower SOA Appliances
Richard Salz wrote:
I would expect hardware designs to be treated more like hardware than
software.
That's an interesting observation, raising the issue of what is speech
vs hardware.
When I looked into this issue, I found the Common Criteria
certification methodology as evidence
Lawerence Spracklen's Blog:
http://blogs.sun.com/sprack/entry/detailed_t2_crypto_info
Detailed T2 crypto info
Very detailed info on the UltraSPARC T2 cryptographic accelerators can be
found here on the OpenSPARC website (the pertinent info can be found in
chapter-21 of the doc)
Posted