Fwd: [Ilugc] Fwd: announcing a open source security system for linux

  • From: TBabu@xxxxxxxxxxx (TBabu@xxxxxxxxxxx)
  • Date: Fri Sep 24 17:17:05 2004







My guess ---> the user has to know answers for a list of questions. The
auth system, will choose one of THESE at radom.

Not that these list of questions are generated on the fly.........

Havent looked into your code. Cant comment.





                                                                           
             Kilaru Sambaiah                                               
             <sambaiah@nmswork                                             
             s.co.in>                                                   To 
             Sent by:                  ilugc@xxxxxxxxxxxxx                 
             ilugc-bounces@ae.                                          cc 
             iitm.ac.in                                                    
                                                                   Subject 
                                       Re: Fwd: [Ilugc] Fwd: announcing a  
             09/24/2004 05:12          open source security system for     
             PM                        linux                               
                                                                           
                                                                           
                                                                           
                                                                           
                                                                           
                                                                           





randover validates users and data .

practical example of randover-

-credit card authentication
-user authentication
-logins
-and more

imagine bering able to authenticate the user where the user has the
control over the login process

randover stands for (rando)m (ver)ification of user data

so randover authenticates the user via a random question.

the process is like this
step1. user registers on the site
step2. user login
 -user is asked a random question.
if answer is correct he is logged in.
if answer is wrong he is not logged in.

its just 10 lines of code that can change the way user logs into the
system.

it can be used alone or integrated with existing systems

its a algorithm for user security.


  What are you telling? If it is a random question, the answer is also
  random and it accepts everyone.

  Cryptography and related fields are very tough. It requires good
  understanding and peer review.

  Pls look into www.counterpane.com or cryptogram newletter fame and
  author of many good security books Bruce Schiener articles.

  There are no silver bullets man.

--

thanks and regards,
Sambaiah K
_______________________________________________
To unsubscribe, email ilugc-request@xxxxxxxxxxxxx with
"unsubscribe <password> address"
in the subject or body of the message.
http://www.ae.iitm.ac.in/mailman/listinfo/ilugc


Other related posts: