[Cialug] July Meeting: ComSec Strategies
Tom Pohl
tom at tcpconsulting.com
Fri Jul 19 20:15:32 CDT 2013
To me, this part of your résumé is pretty darn impressive!
"Designed and implemented an IPL-able routine to provide for extremely rapid dump and restore to/from cards on the IBM 1130. A full system and user library reload could be effected in less than five minutes using the 1442 card read-punch – a considerable reduction from the hour and a half previously required by the standard IBM utility"
-Tom
On Jul 19, 2013, at 7:53 PM, Morris Dovey <mrdovey at iedu.com> wrote:
> On 7/19/13 4:46 PM, Nicolai wrote:
>> On Thu, Jul 18, 2013 at 12:28:11AM -0500, Morris Dovey wrote:
>>> On 7/18/13 12:10 AM, Scott Yates wrote:
>>>> I would urge you to be very careful with custom encryption. Coding strong
>>>> encryption is EXTREMELY challenging to do without leaving holes or weakness
>>>> in the implementation.
>>>
>>> Agreed. Fun tho. :o)
>>
>> That's the way to look at it! Writing crypto code is super fun, but for
>> all but a small number of living people, we're just writing toy ciphers.
>
> It’s an amusement in a not unfamiliar context. Anyone who can find my old (outdated) online resume is invited to speculate as to how I kept busy in 1978.
>
> The toys I’m writing are intended to illustrate Newton’s Third Law. :-)
> _______________________________________________
> Cialug mailing list
> Cialug at cialug.org
> http://cialug.org/mailman/listinfo/cialug
More information about the Cialug
mailing list