Kevin Mark <kevin.mark@verizon.net> wrote: > my impression of the name choice was that they were alphabetic choices > corresponding to a, b, c, the first three letters of the english > language alphabet. (a=alice,b=bob,c=...). The attacker is often known as Mallory, and I have always assumed it was derived from M for malicious. > As for a name used in a test > system: I used to use names of people I knew > or > star trek characters > or > other random characters in a tv show. Max Power and Chesty LaRue. -- Sam Couter | mailto:sam@couter.id.au | jabber:sam@teknohaus.dyndns.org OpenPGP fingerprint: A46B 9BB5 3148 7BEA 1F05 5BD5 8530 03AE DE89 C75C
Attachment:
signature.asc
Description: Digital signature