Mustafa (mwb@go.com.jo)
Wed, 24 Jun 1998 03:01:44 +0300
Great respect for considerate words, people with attitudes like your`s
promote for the better
i hope there are more deep sighted people and less short sighted ones, but
how can one distinguish between worthy and unworthy unless he experiences
both,
I take my hat up for you JNBaily
Mustafa
----------
> From: jnbailly@west.raytheon.com
> To: staym@accessdata.com; acpizer@mach.unseen.org
> Cc: CodherPlunks@toad.com
> Subject: Re[2]: MS Access 2.0
> Date: 23 ?????, 1998 06:34 ?
>
>
>
> Forgive the diversion from the true purpose of this list, but I had
to
> comment on this last message.... Society can never advance if every
> person must recreate the work of everyone else. In order to learn,
> and in order to discover, we MUST be able to build upon the efforts
of
> others. We must be able to trust, and to work as teams. (I'll
leave
> the obvious cryptographic implications of this remark for you to
> consider....) Insulting someone because they have the courage the
ASK
> A QUESTION when they don't know the answer does nothing to advance
> yourself or anyone else. The worst crime would be to NOT ask the
> question.
>
>
> Jacob Bailly
>
>
>
> ______________________________ Reply Separator
_________________________________
> Subject: Re: MS Access 2.0
> Author: acpizer@mach.unseen.org
> Date: 6/23/98 6:18 AM
>
>
> You call yourself "Cryptographer / Programmer" but can't figure out how
> access' password verification algorithm works?
>
> You expect everybody to help you, earn your money and do it YOURSELF.
>
> stop asking stupid questions and do the research on your own.
>
> signed,
> acpizer.
>
>
> On Fri, 19 Jun 1998 staym@accessdata.com wrote:
>
> > Does anyone know what algorithm MS uses to verify passwords for Access
> > 2.0 accounts?
> > --
> > Mike Stay
> > Cryptographer / Programmer
> > AccessData Corp.
> > mailto:staym@accessdata.com
> >
>
>
The following archive was created by hippie-mail 7.98617-22 on Fri Aug 21 1998 - 17:18:55 ADT