Subject Re: [IB-Architect] The Borland Back Door
Author Geoff Worboys
> > Which means you can connect to the ISC4.GDB and read the USERS
> > table, including encrypted copies of all the passwords.
>
> And so what? What you will do with encrypted passwords, that can't
> be encrypted at all???

Aside from the fact that Jim pointed out that we dont even need to get
the original password, please do not have so much faith in encyption -
it is only as good as the key.

An estimate I read recently said that a Zip file encrypted with a 7
character password using only lowercase alphabetic characters
('a'..'z') could be cracked in 1.1 hours using a simple brute force
algorithm! Wordlists and other advancements can break weak keys even
faster.

Geoff Worboys
Telesis Computing