Ripper

Results: 141



#Item
31Multiple sclerosis / Network Driver Interface Specification / Joondalup

Swim for MS Joondalup Fifty-eight swimmers took to the lanes of the Joondalup Arena for the annual Swim for MS in Joondalup on Sunday, 22 June. And what a ripper it was! “Not only was the fundraising effort amazing, th

Add to Reading List

Source URL: d1qmnn0xkv8u83.cloudfront.net

Language: English - Date: 2014-09-23 23:45:06
32Password / Passphrase / John the Ripper / Dictionary attack / Crack / Password manager / Computer security / Security / Cryptography

From Very Weak to Very Strong: Analyzing Password-Strength Meters Xavier de Carné de Carnavalet and Mohammad Mannan Concordia Institute for Information Systems Engineering Concordia University, Montreal, Canada {x_decar

Add to Reading List

Source URL: madiba.encs.concordia.ca

Language: English - Date: 2013-12-07 13:46:37
33Password / Random password generator / John the Ripper / Crypt / Phishing / OTPW / Password manager / Cryptography / Security / Computer security

On The Ecological Validity of a Password Study Sascha Fahl, Marian Harbach, Yasemin Acar, Matthew Smith Usable Security and Privacy Laboratory Leibniz University Hannover, Germany fahl, harbach, acar, -h

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-07-04 18:50:01
34Password / Recall / John the Ripper / Cognitive password / Password policy / Security / Computer security / Cryptography

Memory Retrieval and Graphical Passwords Elizabeth Stobert School of Computer Science Carleton University Ottawa, Canada

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-07-03 09:36:38
35Openwall Project / Password / John the Ripper / Crack / Software / System software / Computer security

Automatic mangling rules generation Simon Marechal (bartavelle at openwall.com) http://www.openwall.com @Openwall December 2012

Add to Reading List

Source URL: www.openwall.com

Language: English - Date: 2012-12-06 13:03:31
36Homicide / Gender-based violence / Violence against women / Murder / Crimes against humanity / Domestic violence / Jack the Ripper / Crime / Criminal law / Death

STREETS OF PAIN, STREETS OF SORROW the circumstances of the occurrence of murder in six areas with high murder rates Report on Component 2 of a study conducted by the Centre for the Study of Violence and

Add to Reading List

Source URL: www.policesecretariat.gov.za

Language: English - Date: 2013-10-25 11:21:07
37Application software / Audio storage / Computer storage media / Consumer electronics / ITunes / DVD-Audio / DVD-Video / DVD ripper / IPod / Media technology / Software / DVD

Microsoft Word - New Microsoft Office Word 文档.docx

Add to Reading List

Source URL: www.clone2go.com

Language: English - Date: 2013-11-14 01:46:19
38Media technology / Video editing software / Freeware / DVD ripper / NCH Software / Freemake Video Converter / Software / Application software / DVD

www.sothinkmedia.com Company Introduction  Who we are  Customers and Services  Solutions

Add to Reading List

Source URL: forum.sothinkmedia.com

Language: English - Date: 2011-03-14 03:45:57
39Cryptographic software / System software / Instruction set architectures / Password / Crypt / John the Ripper / ARM architecture / Central processing unit / Field-programmable gate array / Software / Computer architecture / Bcrypt

Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware Katja Malvoni (kmalvoni at openwall.com)

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2014-11-11 15:42:08
40Electronics / Bcrypt / Cryptographic software / Computer architecture / Crypt / Multi-core processor / John the Ripper / Brute-force attack / Field-programmable gate array / Cryptography / Computing / GPGPU

Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware Katja Malvoni University of Zagreb, Croatia

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-05-03 17:37:18
UPDATE