John the Ripper

Results: 55



#Item
11Password strength / Password / Randomness / John the Ripper / Entropy / Password policy / OTPW / Cryptography / Security / Computer security

Of Passwords and People: Measuring the Effect of Password-Composition Policies Saranga Komanduri1 , Richard Shay1 , Patrick Gage Kelley1 , Michelle L. Mazurek1 , Lujo Bauer1 , Nicolas Christin1 , Lorrie Faith Cranor1 , a

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2011-05-15 21:51:24
12Cryptography / Password / John the Ripper / L0phtCrack / Crack / L0pht / MARC / Computer security / Software / System software

PathWell: Password Topology Histogram Wear-Leveling June 2014 BSides Asheville Hank Leininger – KoreLogic

Add to Reading List

Source URL: www.korelogic.com

Language: English - Date: 2015-04-27 16:19:22
13Cross-platform software / John the Ripper / Env / Ln / Computing / Software / System software

Microsoft Word - MPI and Password Cracking

Add to Reading List

Source URL: download.openwall.net

Language: English - Date: 2009-05-31 22:02:42
14Openwall Project / Password / John the Ripper / Crack / Software / System software / Computer security

Automatic mangling rules generation Simon Marechal (bartavelle at openwall.com) http://www.openwall.com @Openwall December 2012

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-06 13:03:31
15Password / Salt / Computer network security / John the Ripper / Crack / Crypt / Web application security / MD5 / Password policy / Computer security / Cryptography / System software

Supercharged John the Ripper Techniques Austin OWASP Spring, 2011 Rick Redman - KoreLogic

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:05
16Computer cluster / Concurrent computing / MPICH / John the Ripper / Secure Shell / Localhost / Computing / Software / Parallel computing

http://www.petur.euJune 2010 John the Ripper on a UbuntuMPI Cluster

Add to Reading List

Source URL: download.openwall.net

Language: English - Date: 2010-06-17 14:13:59
17Svavar Guðnason

http://www.petur.euJúní 2010 John the Ripper á UbuntuMPI Cluster

Add to Reading List

Source URL: download.openwall.net

Language: English - Date: 2010-06-17 15:01:32
    18Password / Passphrase / John the Ripper / Dictionary attack / Crack / Password manager / Computer security / Security / Cryptography

    From Very Weak to Very Strong: Analyzing Password-Strength Meters Xavier de Carné de Carnavalet and Mohammad Mannan Concordia Institute for Information Systems Engineering Concordia University, Montreal, Canada {x_decar

    Add to Reading List

    Source URL: madiba.encs.concordia.ca

    Language: English - Date: 2013-12-07 13:46:37
    19Password / Random password generator / John the Ripper / Crypt / Phishing / OTPW / Password manager / Cryptography / Security / Computer security

    On The Ecological Validity of a Password Study Sascha Fahl, Marian Harbach, Yasemin Acar, Matthew Smith Usable Security and Privacy Laboratory Leibniz University Hannover, Germany fahl, harbach, acar, -h

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    Language: English - Date: 2013-07-04 18:50:01
    20Password / Recall / John the Ripper / Cognitive password / Password policy / Security / Computer security / Cryptography

    Memory Retrieval and Graphical Passwords Elizabeth Stobert School of Computer Science Carleton University Ottawa, Canada

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    Language: English - Date: 2013-07-03 09:36:38
    UPDATE