12-22-2013
Also, if we search
the NIST document (list of approved products and vendor which are validated to use Dual_EC_DRBG), Skype is not listed as a company or product validated to use the Dual_EC_DRBG crypto.
8 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Can Anybody help to create a pseudo-device and write a device driver for it. The pseudo-device provides a “backdoor” for gaining root access for a particular user. Instead of compiling the device driver into the kernel. Modules are object binaries that can be dynamically loaded into the kernel.
... (1 Reply)
Discussion started by: nyjilgeorge1
1 Replies
2. AIX
Hello,
I was wondering if anyone knows about getting support for AIX ; This forum is a great place but if it has a section for $$$ AIX support where the experts can analyze and answer the questions/queries of the posters ?
Is it possible to get any paid support on this forum ? (8 Replies)
Discussion started by: filosophizer
8 Replies
3. Shell Programming and Scripting
Dear All,
I have two files both containing 10 Million records each separated by comma(csv fmt).
One file is input.txt other is status.txt.
Input.txt-> contains fields with one unique id field (primary key we can say)
Status.txt -> contains two fields only:1. unique id and 2. status
... (8 Replies)
Discussion started by: vguleria
8 Replies
4. Red Hat
Hi, I'm pretty new to Linux and I want to download security patches and install them on RHEL 5.4.
I've searched the red hat web site but cant seem to find where the download link is. (5 Replies)
Discussion started by: Jardoo
5 Replies
5. What is on Your Mind?
Hi all,
I work in the communications field and often have to carry out data gathering/analysis on customer's platforms for issue diagnosis.
In the last 2 months I have noticed a huge increase in distrust from African, Middle Eastern and Asian communication system operators of any data... (0 Replies)
Discussion started by: Skrynesaver
0 Replies
6. OS X (Apple)
That's what appears at the beginning of my bash history (when you type "open .bash_history" in terminal)
sudo -k
export PS1="";sudo echo AUTHENTICATED;echo RETRY
exit
export PS1=""
sudo echo AUTHENTICATED ; sudo -k ; echo AUTHENTIKILL ; echo PROCESSEDAUTHENTICATION
sudo ls;sudo -k;exit;echo... (1 Reply)
Discussion started by: jonathansmith
1 Replies
7. AIX
greetings, just ran across a fun situation we had overlooked.
We have a backdoor user, no special privileges, which we put on every server so that anyone in the shop can get in (passwd in vault) if they need to, even if they don't have a local account on that server. The point of course is to... (3 Replies)
Discussion started by: maraixadm
3 Replies
8. What is on Your Mind?
NSA Starts Contributing Low-Level Code to UEFI BIOS Alternative (0 Replies)
Discussion started by: wisecracker
0 Replies