annotate paste/paste.18986 @ 2364:75c80c422f30

<Jafet> sed -i "2 s#.*#import random; w=[l.split() for l in open(\'/dev/stdin\').read().split(\'\\n\')]; r=[4,7,8,9,2,13,6]; print \'\\n\'.join((lambda s: \' \'.join(chr(3) + str(r[(i+s)%len(r)]) + l[i] for i in range(len(l)))(random.randrange(0, len(r))))#" $(which rainwords)
author HackBot
date Mon, 04 Mar 2013 10:31:19 +0000
parents a0fae3865040
children
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
rev   line source
848
a0fae3865040 <shachaf> pastelog SSH.*packet
HackBot
parents:
diff changeset
1 2009-08-03.txt:20:25:28: <fizzie> AnMaster: I'm using a private SSH key; it's the decrypting of that which takes the 30 seconds, I think, since it hangs up immediately after giving it a passphrase, and then unhangs at the moment it starts sending packets out (sez tcpdump) to the SSH server.
a0fae3865040 <shachaf> pastelog SSH.*packet
HackBot
parents:
diff changeset
2 2012-04-10.txt:16:33:01: <kmc> "Unlike SSH, mosh's UDP-based protocol handles packet loss gracefully, and sets the frame rate based on network conditions. Mosh doesn't fill up network buffers, so Control-C always works to halt a runaway process."
a0fae3865040 <shachaf> pastelog SSH.*packet
HackBot
parents:
diff changeset
3 2012-09-01.txt:22:51:50: <shachaf> kmc: "For example, an attacker can abort an SSH connection or an HTTPS connection by forging a single TCP Reset packet."
a0fae3865040 <shachaf> pastelog SSH.*packet
HackBot
parents:
diff changeset
4 2012-11-09.txt:23:51:50: <kmc> which is that, an attacker can terminate a SSH connection by sending a single RST packet
a0fae3865040 <shachaf> pastelog SSH.*packet
HackBot
parents:
diff changeset
5 2012-11-09.txt:23:54:20: <shachaf> `pastelogs SSH.*packet
a0fae3865040 <shachaf> pastelog SSH.*packet
HackBot
parents:
diff changeset
6 2012-11-09.txt:23:54:32: <shachaf> `pastelog SSH.*packet