Ripper

Results: 141



#Item
21Karla Homolka / Paul Bernardo / Kristen French / Karla / Serial killer / Robert Pickton / Publication ban / Jack the Ripper / Homolka / Crime / Canada / Murder

The History of Violence: Mega Cases of Serial Murder, Self-Propelling Narratives, and Reader Engagement By Thomas Fleming, Ph.D. Wilfrid Laurier University Media coverage of serial murder is both sensational and exhausti

Add to Reading List

Source URL: www.albany.edu

Language: English - Date: 2011-08-11 15:37:48
22Cryptography / Password / John the Ripper / L0phtCrack / Crack / L0pht / MARC / Computer security / Software / System software

PDF Document

Add to Reading List

Source URL: www.korelogic.com

Language: English - Date: 2015-05-18 15:05:43
23Password strength / Password / Randomness / John the Ripper / Entropy / Password policy / OTPW / Cryptography / Security / Computer security

Of Passwords and People: Measuring the Effect of Password-Composition Policies Saranga Komanduri1 , Richard Shay1 , Patrick Gage Kelley1 , Michelle L. Mazurek1 , Lujo Bauer1 , Nicolas Christin1 , Lorrie Faith Cranor1 , a

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2011-05-15 21:51:24
24Cryptography / Password / John the Ripper / L0phtCrack / Crack / L0pht / MARC / Computer security / Software / System software

PathWell: Password Topology Histogram Wear-Leveling June 2014 BSides Asheville Hank Leininger – KoreLogic

Add to Reading List

Source URL: www.korelogic.com

Language: English - Date: 2015-04-27 16:19:22
25Cross-platform software / John the Ripper / Env / Ln / Computing / Software / System software

Microsoft Word - MPI and Password Cracking

Add to Reading List

Source URL: download.openwall.net

Language: English - Date: 2009-05-31 22:02:42
26Acoustic fingerprinting / Gracenote / CD ripper

Gracenote-Music Solutions Style Guide-R6

Add to Reading List

Source URL: doors.gracenote.com

Language: English - Date: 2013-06-04 19:32:26
27Openwall Project / Password / John the Ripper / Crack / Software / System software / Computer security

Automatic mangling rules generation Simon Marechal (bartavelle at openwall.com) http://www.openwall.com @Openwall December 2012

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-06 13:03:31
28Password / Salt / Computer network security / John the Ripper / Crack / Crypt / Web application security / MD5 / Password policy / Computer security / Cryptography / System software

Supercharged John the Ripper Techniques Austin OWASP Spring, 2011 Rick Redman - KoreLogic

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:05
29Computer cluster / Concurrent computing / MPICH / John the Ripper / Secure Shell / Localhost / Computing / Software / Parallel computing

http://www.petur.euJune 2010 John the Ripper on a UbuntuMPI Cluster

Add to Reading List

Source URL: download.openwall.net

Language: English - Date: 2010-06-17 14:13:59
30Svavar Guðnason

http://www.petur.euJúní 2010 John the Ripper á UbuntuMPI Cluster

Add to Reading List

Source URL: download.openwall.net

Language: English - Date: 2010-06-17 15:01:32
    UPDATE