On Tue, 5 May 2020, Martin Gregorie wrote:

On Mon, 2020-05-04 at 16:25 -0600, Grant Taylor wrote:
I think $DatabaseTechnology's main benefit is keeping the password
data outside of the configuration files.

Agreed, in this sort of corner case.

    select count(*) where log.key = md5(key);

Neat.

Agreed, but we still have the boundary problem.

In the hopes of leveraging existing facilities: Is there a way to mark individual bayes tokens as poison pills?

The message is already being tokenized and scanned for Bayes (presuming you have that enabled). If there's a way to mark a token in Bayes as causing an automatic 1.000 then that might be a usable approach.

(Granted, it's not encrypted.)

--
 John Hardin KA7OHZ                    http://www.impsec.org/~jhardin/
 jhar...@impsec.org    FALaholic #11174     pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
-----------------------------------------------------------------------
  I'm seriously considering getting one of those bright-orange prison
  overalls and stencilling PASSENGER on the back. Along with the paper
  slippers, I ought to be able to walk right through security.
                                             -- Brian Kantor in a.s.r
-----------------------------------------------------------------------
 4 days until the 75th anniversary of VE day

Reply via email to