Ripper

Results: 141



#Item
41Password strength / Password / Randomness / John the Ripper / Entropy / Password policy / OTPW / Cryptography / Security / Computer security

Of Passwords and People: Measuring the Effect of Password-Composition Policies

Add to Reading List

Source URL: www.pdl.cmu.edu

Language: English - Date: 2011-06-21 16:20:55
42Arts / From Hell / Frederick Abberline / Little Orphan Annie / Annie / Jack the Ripper / Comics / Film / Jack the Ripper in fiction

rFROM HELL The Real Story of Jack the Ripper by Terry Hayes Based on the Comic Series by Alan Moore and Eddie Campbell

Add to Reading List

Source URL: www.horrorlair.com

Language: English - Date: 2013-05-15 17:00:06
43Cryptography / Password / Crypt / John the Ripper / Password policy / Cognitive password / Computer security / Security / Access control

Does My Password Go up to Eleven? The Impact of Password Meters on Password Selection Serge Egelman1 , Andreas Sotirakopoulos2 , Ildar Muslukhov2 , Konstantin Beznosov2 , and Cormac Herley3 1 2

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2013-04-29 12:12:39
44Quilt / Quilting / Blankets / Folk art

Hidden Spools Class Supply List © Bonnie K Hunter & Quiltville.comGeneral Supplies needed: Sewing machine in working order (including power cords and extension cords) Thread, scissors, seam ripper, pins and a

Add to Reading List

Source URL: quiltville.com

Language: English - Date: 2014-03-06 12:33:18
45Password / Crypt / John the Ripper / Phishing / Privileged password management / OTPW / Security / Computer security / Cryptography

Improving Text Passwords Through Persuasion Alain Forget1,2 , Sonia Chiasson1,2 , P.C. van Oorschot1 , Robert Biddle2 1 School of Computer Science & 2 Human Oriented Technology Lab Carleton University, Ottawa, Canada

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2010-02-10 11:41:36
46Password / Crack / John the Ripper / Crypt / Cryptography / Password cracking / Password strength / Software / System software / Computer security

DESIGNING AND CRACKING ASSOCIATIVE PASSWORDS KIRSI HELKALA ASSOCIATE PROFESSOR GJØVIK UNIVERSITY COLLEGE

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-04 17:14:18
47Password / Key management / John the Ripper / Crypt / Key derivation function / Brute-force attack / OTPW / Shadow password / Cryptography / Security / Computer security

Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Trent Jaeger Systems and Internet Infrastructure Securit

Add to Reading List

Source URL: www.enck.org

Language: English
48Cyberwarfare / Password / Computer crimes / Passphrase / John the Ripper / Phishing / Crypt / Password policy / Cognitive password / Computer security / Security / Cryptography

Text Entry Method Affects Password Security Yulong Yang† , Janne Lindqvist† , Antti Oulasvirta‡ † Rutgers University, ‡ Aalto University Abstract Background. Text-based passwords continue to be the

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-04-21 23:17:08
49

DISTRICT COURT OF QUEENSLAND CITATION: Ripper v Suncorp Metway Insurance LimitedQDC 107

Add to Reading List

Source URL: archive.sclqld.org.au

Language: English - Date: 2012-05-21 22:55:47
    50United Kingdom / Great Famine / Fellows of the Royal Society / Charles Dickens / Jack the Ripper / Irish diaspora / Isambard Kingdom Brunel / England / Irish Famine / British people / English people / English architects

    19th Century British Library Newspapers

    Add to Reading List

    Source URL: gale.cengage.co.uk

    Language: English - Date: 2009-12-18 07:33:59
    UPDATE