![]() |
|
|
#89 |
|
"Richard B. Woods"
Aug 2002
Wisconsin USA
1E0C16 Posts |
|
|
|
|
|
|
#90 | |
|
Nov 2008
2·33·43 Posts |
Quote:
|
|
|
|
|
|
|
#91 |
|
Jul 2009
1D16 Posts |
Thanks for all.
As I said before, I'm expert in reverse engineering and ASM programming... I know all you said, this program even had a lot of checksums but I patched all of them, but again this is not a case for me, because: 1) Program developer is not accessible, even if he become accessible for me, I don't want anyone know that I'm doing such thing. 2) I can't install my modified exe in other computers in network. I can patch my program, how about others? How about server-side program that have Private keys of this program? It will not be able to continue working... So I need a solution on finding D key without making anything in my network, nobody should know what I'm doing... |
|
|
|
|
|
#92 |
|
"Serge"
Mar 2008
Phi(4,2^7658614+1)/2
9,497 Posts |
Here's the summary for the masses
http://xkcd.com/538/ Code:
A Crypto nerd's imagination: Guy [[Holding Laptop]]: His laptop's encrypted. Let's build a million-dollar cluster to crack it. Other guy: No good! It's 4096-bit RSA! Guy: Blast! Our evil plan is foiled! What would actually happen: Guy [[Holding money tag and wrench]]: His laptop's encrypted. Drug him and hit him with this $5 wrench until he tells us the password. Other guy [[taking the wrench]]: Got it. Actual Actual Reality: Nobody really cares about his secrets. (Also, I would be hard pressed to find that wrench for $5.)
|
|
|
|
|
|
#93 |
|
Account Deleted
"Tim Sorbera"
Aug 2006
San Antonio, TX USA
10AB16 Posts |
The way I see it, there are roughly five possibilities: (along with my Adam Savage-style chances! if you don't know what I'm talking about, Adam Savage is one of the hosts of "Mythbusters", a US show where repeatable myths are tested/exploded, and he often gives a few different scenarios before an experiment is conducted with his estimated chances of it happening)
Last fiddled with by Mini-Geek on 2009-07-16 at 11:55 |
|
|
|
|
|
#94 | |
|
"Richard B. Woods"
Aug 2002
Wisconsin USA
170148 Posts |
Quote:
I think #5 is the one that's consistent with all CodeX's posts. ... but CodeX's was doomed to failure for technical reasons, anyway -- social engineering can't get what isn't there. Last fiddled with by cheesehead on 2009-07-16 at 12:52 |
|
|
|
|
|
|
#95 |
|
Tribal Bullet
Oct 2004
3·1,181 Posts |
|
|
|
|
|
|
#96 |
|
"Ben"
Feb 2007
2×3×587 Posts |
Furthermore, we (certainly I), are not trying to help solve anything and don't view this as a collaborative "project". I don't want anything to do with it, and have only tried to help you understand the futility of what you're trying to do. I suspect the "help" you are getting from certain people is done purely for their own amusement.
|
|
|
|
|
|
#97 |
|
Jul 2009
358 Posts |
Who cares? Yes, option 5 is correct... I don't need your help anymore... Knowing what I'm doing is not your business, if you had knowledge to help you would...
You should understand a person who's expert in reversing, have access to a super computer is not playing game, he's doing something serious... I did big mistake by asking/registering in this forum, I had another idea to solve this problem and I got it solved, now you can continue making fun with yourself and I'm going back to my business... I'm leaving here... Just I have a suggestion to you guys! Next time be more serious in solving problems, next time say that you can't do any help from first time, next time think more before commenting... Bye |
|
|
|
|
|
#98 | ||||||
|
"Richard B. Woods"
Aug 2002
Wisconsin USA
22·3·641 Posts |
Quote:
Quote:
(Note that I'm not categorizing your personality as a mistake. You probably couldn't help that.) Quote:
Quote:
Quote:
Don't mistake your ignorance for our insincerity. We weren't asking you for more information to string you along (no matter how attractive you find conspiracy theories). Our requests were for information we really, truly needed in order to help you. Your continual reluctance to divulge details gave away the illegality of your purposes. Quote:
Talk about egotistic ... Last fiddled with by cheesehead on 2009-07-18 at 00:08 |
||||||
|
|
|
|
|
#99 |
|
A Sunny Moo
Aug 2007
USA (GMT-5)
624910 Posts |
Hmm...considering as how CodeX admitted to wanting to factor this key for illegal purposes, maybe Xyzzy could nab his IP address and report it to the authorities? Unless, of course, he's using a proxy of some sort...nonetheless, I doubt it would hurt to report him anyway.
|
|
|
|
![]() |
| Thread Tools | |
Similar Threads
|
||||
| Thread | Thread Starter | Forum | Replies | Last Post |
| Factoring a 160 digit RSA key | swistak | Factoring | 6 | 2010-11-17 23:49 |
| How much digit in the M? | Lorenzo | Math | 17 | 2010-08-26 16:54 |
| Need a quick factoring for 21-digit number | jasong | Factoring | 5 | 2007-11-19 17:49 |
| 160 digit factor found of 366 digit (PRP-1) | AntonVrba | Factoring | 7 | 2005-12-06 22:02 |
| Factoring a 617-digit number? | Shakaru | Factoring | 2 | 2005-02-23 19:22 |