05-11-2007
Quote:
Originally Posted by Perderabo
Well then blowtorch could open the executable for writing and truncate it to zero bytes. That would not be "storing data".
Yes, truncating sounds as valid as the unlink/rm file solution. But a lot depends on how you parse the challenge. You could parse the challenge to mean that any file access is forbidden. But if that is the case, I don't think it is solvable.
6 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi,
Can anybody provide me Pointers to Practice tests or any Material to prepare for Brainbench certification in Unix Shell Scripting? Also how good is this Certification for UNIX programmers. Is it worth it? I'm planning to take this certification in 2 weeks. Kindly let me know all the pros... (0 Replies)
Discussion started by: pavan_emani
0 Replies
2. Shell Programming and Scripting
Hi gurus,
I have done my best to be as precisely as possible with this.
Besides giving the format of file a and file b and the result file
I have also given the algorithm as I have figured out.
I will try to do this and I hope that some of you could help
me to solve this or better yet... (1 Reply)
Discussion started by: ljankok
1 Replies
3. Programming
Hi Gurus,
To the Brain Teaser, if I add another condition, say the executable should not be altered, how the program should be altered? (no perl please, purely C). I forgot to mention this condition my staff had mentioned. ( forgot then and got now :D )
The program executed the first time... (4 Replies)
Discussion started by: vrk1219
4 Replies
4. What is on Your Mind?
A global group of scientists are spending the next ten years and a billion dollars to try and develop a computer simulation of the brain:
https://www.humanbrainproject.eu/
I always found it fascinating that the brain can understand itself. This almost sounds like in a few years the computer... (0 Replies)
Discussion started by: figaro
0 Replies
5. Shell Programming and Scripting
G'day,
Here's a teaser for a sed guru, which I surely am not one, as even my
basic sed skills are rusted from years of not practising ... lol
Ok ... we have a string of digits such as:
632413741610252847552619172459483022433027602515212950543016701812771409213148672112
we want it split... (9 Replies)
Discussion started by: naderra
9 Replies
6. What is on Your Mind?
Working on a new cybersecurity, dystopian world series and made a short 2 min teaser today.
Cyber Dystopia (720 HD)
https://www.youtube.com/watch?v=g9Ca07J_YC8
If anyone has any ideas for the story, please write out some story lines in the comments and join the production team! (1 Reply)
Discussion started by: Neo
1 Replies
LEARN ABOUT PHP
openssl_spki_new
OPENSSL_SPKI_NEW(3) 1 OPENSSL_SPKI_NEW(3)
openssl_spki_new - Generate a new signed public key and challenge
SYNOPSIS
string openssl_spki_new (resource &$privkey, string &$challenge, [int $algorithm])
DESCRIPTION
Generates a signed public key and challenge using specified hashing algorithm
PARAMETERS
o $privkey
-$privkey should be set to a private key that was previously generated by openssl_pkey_new(3) (or otherwise obtained from the
other openssl_pkey family of functions). The corresponding public portion of the key will be used to sign the CSR.
o $challenge
- The challenge associated to associate with the SPKAC
o $algorithm
- The digest algorithm. See openssl_get_md_method().
RETURN VALUES
Returns a signed public key and challenge string or NULL on failure.
ERRORS
/EXCEPTIONS
Emits an E_WARNING level error if an unknown signature algorithm is passed via the $algorithm parameter.
EXAMPLES
Example #1
openssl_spki_new(3) example
Generate a new SPKAC with the default digest (MD5)
<?php
$pkey = openssl_pkey_new('secret password');
$spkac = openssl_spki_new($pkey, 'testing');
if ($spkac !== NULL) {
echo $spkac;
} else {
echo "SPKAC generation failed";
}
?>
The above example will output something similar to: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SEE ALSO
openssl_spki_new(3), openssl_spki_export_challenge(3), openssl_spki_export(3), openssl_csr_new(3), openssl_csr_sign(3).
PHP Documentation Group OPENSSL_SPKI_NEW(3)