On Mon, Jan 07, 2002 at 03:09:07PM +, Alexander Clouter wrote:
> On Jan 06, Pavel Minev Penev wrote:
> >
> > 1. Generate billions of passwords.
> > For each of them:
> > 1. Setup a loop device.
> > 2. Read the block after the 1024-th byte and check it
> >
On Mon, Jan 07, 2002 at 07:59:35AM -0500, Anthony DeRobertis wrote:
>
> On Sunday, January 6, 2002, at 04:00 , Pavel Minev Penev wrote:
>
> >There are about 3304 proceses with sequential PIDs and names of
> >"[loop7 ]", and are all zombies.
>
> Are you calling fork in your code? Are you calling
On Sun, Jan 06, 2002 at 04:10:12AM -0700, Stefan Srdic wrote:
> On January 6, 2002 02:00 pm, Pavel Minev Penev wrote:
> >
> > Hello.
> >
> > I had a peculiar experience with a password (forgot it). It is the
> > password for an AE
> > S-encrypted partition on my HDD. I am using the loop
> > device
On Mon, Jan 07, 2002 at 03:09:07PM +, Alexander Clouter wrote:
> On Jan 06, Pavel Minev Penev wrote:
> >
> > 1. Generate billions of passwords.
> > For each of them:
> > 1. Setup a loop device.
> > 2. Read the block after the 1024-th byte and check it
> >
On Mon, Jan 07, 2002 at 07:59:35AM -0500, Anthony DeRobertis wrote:
>
> On Sunday, January 6, 2002, at 04:00 , Pavel Minev Penev wrote:
>
> >There are about 3304 proceses with sequential PIDs and names of
> >"[loop7 ]", and are all zombies.
>
> Are you calling fork in your code? Are you calling
On Sun, Jan 06, 2002 at 04:10:12AM -0700, Stefan Srdic wrote:
> On January 6, 2002 02:00 pm, Pavel Minev Penev wrote:
> >
> > Hello.
> >
> > I had a peculiar experience with a password (forgot it). It is the
> > password for an AE
> > S-encrypted partition on my HDD. I am using the loop
> > device
On Jan 06, Pavel Minev Penev wrote:
>
> 1. Generate billions of passwords.
> For each of them:
> 1. Setup a loop device.
> 2. Read the block after the 1024-th byte and check it
> for Ext2/Ext3's magic ID.
> If the ID matches:
>
On Jan 06, Pavel Minev Penev wrote:
>
> 1. Generate billions of passwords.
> For each of them:
> 1. Setup a loop device.
> 2. Read the block after the 1024-th byte and check it
> for Ext2/Ext3's magic ID.
> If the ID matches:
>
On Sunday, January 6, 2002, at 04:00 , Pavel Minev Penev wrote:
There are about 3304 proceses with sequential PIDs and names of
"[loop7 ]", and are all zombies.
Are you calling fork in your code? Are you calling waitpid or friends?
Who's children are those? (try ps fxa)
On Sunday, January 6, 2002, at 04:00 , Pavel Minev Penev wrote:
> There are about 3304 proceses with sequential PIDs and names of
> "[loop7 ]", and are all zombies.
Are you calling fork in your code? Are you calling waitpid or friends?
Who's children are those? (try ps fxa)
--
To UNSUBSCRIB
On January 6, 2002 02:00 pm, Pavel Minev Penev wrote:
>
> Hello.
>
> I had a peculiar experience with a password (forgot it). It is the
> password for an AE
> S-encrypted partition on my HDD. I am using the loop
> device and the international kernel patch. I wrote a brute-forcer
> (didn't find docs
Hello.
I had a peculiar experience with a password (forgot it). It is the
password for an AES-encrypted partition on my HDD. I am using the loop
device and the international kernel patch. I wrote a brute-forcer
(didn't find docs and stole a lot of code from mount and losetup).
The problem is that
On January 6, 2002 02:00 pm, Pavel Minev Penev wrote:
>
> Hello.
>
> I had a peculiar experience with a password (forgot it). It is the
> password for an AE
> S-encrypted partition on my HDD. I am using the loop
> device and the international kernel patch. I wrote a brute-forcer
> (didn't find doc
Hello.
I had a peculiar experience with a password (forgot it). It is the
password for an AES-encrypted partition on my HDD. I am using the loop
device and the international kernel patch. I wrote a brute-forcer
(didn't find docs and stole a lot of code from mount and losetup).
The problem is tha
14 matches
Mail list logo