29%
14.03.2013
Schneier's blog entry: http://www.schneier.com/blog/archives/2012/09/sha-3_will_be_a.html
Talk at 25C3 about spoofed MD5 signatures: http://media.ccc.de/browse/congress/2008/25c3-3023-en
29%
14.03.2013
a progress indicator like this
[ 30% ] Applying progress: 43:22 mins remaining.
during the transfer process. When the image is fully transferred to the USB drive, you need to enter one final command to copy
29%
17.06.2011
,200, comprising 55 different commands, were issued. The system, a server with 768MB RAM and a Pentium 3 CPU, took a total of 22 seconds to answer them, the longest response took 32 milliseconds, the shortest
29%
31.10.2025
's usually TCP port 22) to port 2222, for example, to keep port scans from filling up your logs. Without TCP Wrappers enabled, scans might run dictionary attacks on your server where password combinations ... 2012
29%
30.11.2025
/* connect {}: controls servers we connect to (OLD C:, N:, H:, L:) */
02 connect "services.irc.hastexo.com" {
03 /* the name must go above */
04
05 /* host: the host or IP to connect to ... 2012
29%
30.11.2025
this and enter search keys!" > searchkeys.tex
10
11 # Edit search keys
12
13 gedit searchkeys.tex
14
15
16 # Create Latex document
17
18 echo "\documentclass[10pt,a4paper]{article}
19 \usepackage[utf8]{inputenc ... 2012
29%
30.11.2025
: " . $password . "\n
";
13 echo "Hash: " . $hashvalue . "\n
";
14
15 // Compare $password with the store has:
16 $passwordfromdb = '$P$9IQRaTwmfeRo7ud9Fh4E2PdI0S3r.L0';
17 // stored hash, would
29%
30.11.2025
="walk" value="true"/>
22
23
24
25
29%
30.11.2025
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days.
Brute force is a single-character-at-a
29%
30.11.2025
about the I/O performance on the guest systems, I was able to measure these speed hits on the HP system compared with the bare metal system. Installing a battery-buffered, 512MB write cache module vastly