First Page | Document Content | |
---|---|---|
![]() Date: 2009-08-16 16:22:06Espionage Search algorithms Hashing Rainbow table Password John the Ripper LM hash Salt Crypt Cryptography Cryptographic hash functions Computer security | Add to Reading List |
![]() | Measuring Real-World Accuracies and Biases in Modeling Password Guessability Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek† , WilliDocID: 1la8e - View Document |
![]() | Grid Implemented John the Ripper aka GI John Bucsay Balázs
DocID: 1dkE7 - View Document |
![]() | http://www.petur.euJúní 2010 John the Ripper á UbuntuMPI ClusterDocID: 1dfT8 - View Document |
![]() | Parallelization of John the Ripper (JtR) using MPI Ryan Lim Computer Science and Engineering University of Nebraska–Lincoln Lincoln, NEDocID: 1bFA1 - View Document |
![]() | Parallelization of John the Ripper (JtR) using MPI Ryan Lim Computer Science and Engineering University of Nebraska–Lincoln Lincoln, NEDocID: 1b4Ig - View Document |