Wow, I didn't expect that flood of replies.
I want to qualify what my paper is made of, since the whole world now
seems to be interested in this little document. Now I wish I finished
it before I said anything.
o It primarily looks at the mechanisms of logon security and
o I didn't include known insecure protocols such as telnet, ftp,
finger, tftp, etc.
o It's not finished. It's not polished. I wouldn't grade it.
o It's mine, you can use the data, but don't publish it without
o I'd appreciate comments.
I did post it on a temporary page at http://www.hidata.com, the paper
is posted there in DOC, PDF, and PS formats. The page will die next
Wednesday, since I will have other uses for that address.
Have at it.