[Moderator's note: top posting and failing to trim what you're
replying to are both considered bad form... --Perry]
Peter,
Do you have evidence of either Authenticode or business impersonation?
I agree that they're highly plausible, but you say if the putative
owner of an AuthentiCode
Adam Shostack a...@homeport.org writes:
Do you have evidence of either Authenticode or business impersonation? I
agree that they're highly plausible, but you say if the putative owner of
an AuthentiCode certificate used to sign a piece of malware is ever tracked
down then it's invariably some
Adam Shostack a...@homeport.org writes:
I'd be estatic with a frequency analysis that I could show to people.
This always happens right after you hit ^D... it turns out that Microsoft
actually has published figures for this, although it's fairly recent so I
hadn't seen it before now:
Hi,
I wrote a patch to force openssh to use constant time
and packet-size on the SSHv2 connection so observers
of traffic cant correlate SSH connections to each other.
You can find it here:
http://c-skills.blogspot.com/2008/12/sshv2-trickery.html
l8er,
Sebastian
--
~~
~~ perl self.pl
~~
Source:
http://bits.blogs.nytimes.com/2008/12/22/d-wave-arms-smoking-gun-proof-of-quantum-computer/
Once D-Wave collects the results of the simulations and processes the
information, it will compare the simulation against an actual run of
its latest quantum computer, which should be completed in