(07-04-2012, 05:52 PM)Bitweasil Wrote:(07-04-2012, 09:50 AM)thorsheim Wrote: Sounds like there could be business in putting up a server rack loaded with 7970's, and a simple web interface for submitting hashes to oclHashcat... :-)
Didn't you just say on twitter that you'd never fire your hashes out into the void?
True. But that's just me. Consider me paranoid. :-) Anything "cloud" is popular among developers, marketing managers and sales people over here, while many CTO's and security people are still not that ecstatic about it.
(07-04-2012, 09:08 PM)KT819GM Wrote: He can setup system and give ssh access to user. To intercept ssh tunneled terminal instance ... I doubt it's possible.
First rule to learn about security: nothing is secure.
Second rule: nothing will ever be secure.
Third rule: learn how to manage risk. ;-)