is there anyway to convert a tripcode into the password for that tripcode, im using tripsage and I see that you can put in a word you want to see in a trip code and it produces results of passwords that would produce a tripcode with those letters in it, so if we were to take a complete tripcode someone has and enter it into that field, in theory it should eventually produce the 1 password that produces that tripcode, however i have a core 2 duo e6600 which can run 170,000 crypts per second but with over 10^80 possible combinations(numbers + letters + capital letters + symbols, and 10 characters in a tripcode) it would take litteraly much more than trillions of years to run through every combination. Any other suggestions?
Name:
Anonymous2009-05-05 18:42
the funny thing is, >>633 actually is better than Xarn's haskell, not only because it's shorter and easier to read, but also because factor's FFI is a lot faster than ghc's and it uses openssl's DES_crypt, which is much faster than glibc's crypt.
>>648
the blog post actually did use libc crypt (which on GNU systems is that slow as fuck GNU crypt, and on BSD systems is a crypt that is slightly faster than openssl DES_crypt on 64-bit systems and slightly slower on 32-bit systems) originally.
Are you done hacking the gibson? I heard it only takes a few hydra worms to get in, is that true?
Name:
Anonymous2009-06-11 20:08
>>677
If you know about it now, they've already fixed it.
Name:
Anonymous2009-06-11 20:52
>>677
Well, that's one way, but if you ask me, you should use a slow virus. This ain't bore and inject; it's more like you interface with the ice so slow, the ice doesn't feel it. The face of the Kuang logics kinda sleazes up to the target and mutates, so it gets to be exactly like the ice fabric. Then you lock on and the main programs cut in, start talking circles 'round the logics in the ice. It's K-rad.
Name:
Anonymous2009-06-12 3:25
I think I could ddos the Gibson with a sicp tcp flood. Would that help?