|Subject||Re: [IB-Architect] The Borland Back Door|
> > Which means you can connect to the ISC4.GDB and read the USERSAside from the fact that Jim pointed out that we dont even need to get
> > table, including encrypted copies of all the passwords.
> And so what? What you will do with encrypted passwords, that can't
> be encrypted at all???
the original password, please do not have so much faith in encyption -
it is only as good as the key.
An estimate I read recently said that a Zip file encrypted with a 7
character password using only lowercase alphabetic characters
('a'..'z') could be cracked in 1.1 hours using a simple brute force
algorithm! Wordlists and other advancements can break weak keys even