Cracking

Results: 1107



#Item
81

GSM crypto system : A5 family Cracking via GPU Hackito Ergo SumGloire Gwendal

Add to Reading List

Source URL: 2010.hackitoergosum.org

Language: English - Date: 2010-04-16 11:09:41
    82Computing / Computer architecture / Computer network security / Wireless networking / IEEE 802.11 / Local area networks / Cryptographic protocols / Wireless / Wi-Fi Protected Access / Protected Extensible Authentication Protocol / Ubuntu / Cracking of wireless networks

    Connecting to the Rovernet WPA2 Secured Wireless Network with with UbuntuIntreped Ibex) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requir

    Add to Reading List

    Source URL: www.it.mtu.edu

    Language: English - Date: 2015-09-21 08:47:24
    83Cryptography / Cyberwarfare / System administration / Cybercrime / Password / Rootkit / Fsck / Su / Malware / Computer security / Password cracking / Password manager

    How They Do It: Unix Hacking 101 Hal Pomeranz Deer Run Associates Who Am I?

    Add to Reading List

    Source URL: www.deer-run.com

    Language: English - Date: 2004-08-16 11:51:23
    84Computer network security / Cryptographic protocols / Wi-Fi / IEEE 802.11 / Wireless networking / Wi-Fi Protected Access / IEEE 802.1X / IEEE 802.11i-2004 / AirPort / Wireless security / Cracking of wireless networks

    Connecting to the Rovernet WPA2 Secured Wireless Network with the Mac OS XTiger) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements

    Add to Reading List

    Source URL: www.it.mtu.edu

    Language: English - Date: 2015-09-21 08:47:24
    85

    Stressed-Out Metals: Predicting their Response from the Bottom Up Emily A. Carter Princeton University Stress corrosion cracking of steel Stressed and Embrittled Fe:

    Add to Reading List

    Source URL: simons.hec.utah.edu

    Language: English - Date: 2008-07-30 10:41:26
      86Catalysis / Fluid catalytic cracking / Homogeneous catalysis / Tobin J. Marks

      Microsoft Word - Jeff_Miller_IACT

      Add to Reading List

      Source URL: www.iact.anl.gov

      Language: English - Date: 2009-09-14 11:04:06
      87

      Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms Saranga Komanduri Patrick Gage Kelley, Michelle L. Mazurek,

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2012-06-01 23:27:39
        88

        Removing of Pollutants from Catalytic Cracking Wastewater by Oxidation with Nanostructured Catalysts MIHAELA BOMBOS1, CASEN PANAITESCU2*, TRAIAN JUGANARU2, GABRIEL VASILIEVICI1, DORIN BOMBOS2 1 National Institute for Res

        Add to Reading List

        Source URL: www.revmaterialeplastice.ro

        Language: English - Date: 2016-03-14 05:45:42
          89Cryptography / Cryptographic hash functions / Password / Security / Crypt / SHA-1 / Encryption / Database encryption / Password cracking

          Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

          Add to Reading List

          Source URL: www.estv.admin.ch

          Language: English
          90

          CRACKING THE CODE ON APPLICATION SECURITY BUY-IN How to Work With Teams in Your Organization to Make AppSec a Success

          Add to Reading List

          Source URL: www.veracode.com

          Language: English - Date: 2016-01-07 12:14:21
            UPDATE