Differences
This shows you the differences between the selected revisions of the page.
| 2006-05-23 | 2006-06-10 | ||
| old revision restored (martin) (hidden) | no summary (84.244.84.34) (hidden) | ||
| Line 55: | Line 55: | ||
| exhaustive brute-force attack have been well within the realm of | exhaustive brute-force attack have been well within the realm of | ||
| commercial feasibility for some time. | commercial feasibility for some time. | ||
| + | ergergargrgergearg | ||
| ===== SSH Protocols ===== | ===== SSH Protocols ===== | ||
| Line 81: | Line 82: | ||
| attacks more difficult to execute and by providing less data for | attacks more difficult to execute and by providing less data for | ||
| cryptanalysis. | cryptanalysis. | ||
| - | |||