> > information. How long would it take him to crack the key (with today's
> It depends, but using about 50 or 100 Pentium or Pentium Pro PC's less
> than a week (might be even much less time). Not very strong, is it? The
I don't quite understand how a network of computers can be set to do this
sort of thing. In fact .. I don't really understand how this works at all ..
can anyone enlighten me about how
a) you can decrypt at all
b) you can split up the process between different machines?
PS I tried to open up our fwtk based firewall earlier today to our network
for an hour while I did a full backup. Standard backup procedures here
use rsh (yeah ... I know ... but it does work and we have a pretty open
internal network) so I opened up the rsh bit in inetd.conf and added
/.rhosts and /etc/hosts.equiv but still get 'permission denied' when trying
to run a remote shell on it .. it had previously run a demo version of
Raptor's Eagle - would that have changed things in the kernel making rsh
etc unworkable ? If not .. am I missing anything glaringly obvious?