Not by me.
Falling down stairs.
did they put dudes in that video at all. Men in tights aren't a good thing from any angle.
We are issuing certificates to personal devices and using SAML authentication to allow access to critical applications from the internet. We figure there will be no 'internal' network eventually everything will be done from the cloud. I can see this for sales type people who only need to work with some applications, but for those of us who own these applications it might be a bit more difficult.
It's not a conventional cypher so standard cryptanalysis won't work. It could be a rotating key depending on line number or word position where simple frequency analysis would be thrown off. You'd need more samples to look at, and try to develop a pattern.
Was probably pencil.
We write out our passwords to a gpg encrypted file which each one of our group members can decrypt with their private key. This file is stored in rcs/perforce.
Our perforce data is mirrored to 3 sites.
So you think that money is the root of all evil. Have you ever asked what is the root of money? -- Ayn Rand