John the Ripper

Results: 55



#Item
11Of Passwords and People: Measuring the Effect of Password-Composition Policies Saranga Komanduri1 , Richard Shay1 , Patrick Gage Kelley1 , Michelle L. Mazurek1 , Lujo Bauer1 , Nicolas Christin1 , Lorrie Faith Cranor1 , a

Of Passwords and People: Measuring the Effect of Password-Composition Policies Saranga Komanduri1 , Richard Shay1 , Patrick Gage Kelley1 , Michelle L. Mazurek1 , Lujo Bauer1 , Nicolas Christin1 , Lorrie Faith Cranor1 , a

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2011-05-15 21:51:24
12PathWell: Password Topology Histogram Wear-Leveling June 2014 BSides Asheville Hank Leininger – KoreLogic

PathWell: Password Topology Histogram Wear-Leveling June 2014 BSides Asheville Hank Leininger – KoreLogic

Add to Reading List

Source URL: www.korelogic.com

Language: English - Date: 2015-04-27 16:19:22
13Microsoft Word - MPI and Password Cracking

Microsoft Word - MPI and Password Cracking

Add to Reading List

Source URL: download.openwall.net

Language: English - Date: 2009-05-31 22:02:42
14Automatic mangling rules generation Simon Marechal (bartavelle at openwall.com) http://www.openwall.com @Openwall  December 2012

Automatic mangling rules generation Simon Marechal (bartavelle at openwall.com) http://www.openwall.com @Openwall December 2012

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-06 13:03:31
15Supercharged John the Ripper Techniques Austin OWASP Spring, 2011 Rick Redman - KoreLogic

Supercharged John the Ripper Techniques Austin OWASP Spring, 2011 Rick Redman - KoreLogic

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:05
16http://www.petur.euJune 2010 John the Ripper on a UbuntuMPI Cluster

http://www.petur.euJune 2010 John the Ripper on a UbuntuMPI Cluster

Add to Reading List

Source URL: download.openwall.net

Language: English - Date: 2010-06-17 14:13:59
17http://www.petur.euJúní 2010 John the Ripper á UbuntuMPI Cluster

http://www.petur.euJúní 2010 John the Ripper á UbuntuMPI Cluster

Add to Reading List

Source URL: download.openwall.net

Language: English - Date: 2010-06-17 15:01:32
    18From Very Weak to Very Strong: Analyzing Password-Strength Meters Xavier de Carné de Carnavalet and Mohammad Mannan Concordia Institute for Information Systems Engineering Concordia University, Montreal, Canada {x_decar

    From Very Weak to Very Strong: Analyzing Password-Strength Meters Xavier de Carné de Carnavalet and Mohammad Mannan Concordia Institute for Information Systems Engineering Concordia University, Montreal, Canada {x_decar

    Add to Reading List

    Source URL: madiba.encs.concordia.ca

    Language: English - Date: 2013-12-07 13:46:37
    19On The Ecological Validity of a Password Study Sascha Fahl, Marian Harbach, Yasemin Acar, Matthew Smith Usable Security and Privacy Laboratory Leibniz University Hannover, Germany  fahl, harbach, acar, -h

    On The Ecological Validity of a Password Study Sascha Fahl, Marian Harbach, Yasemin Acar, Matthew Smith Usable Security and Privacy Laboratory Leibniz University Hannover, Germany fahl, harbach, acar, -h

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    Language: English - Date: 2013-07-04 18:50:01
    20Password / Recall / John the Ripper / Cognitive password / Password policy / Security / Computer security / Cryptography

    Memory Retrieval and Graphical Passwords Elizabeth Stobert School of Computer Science Carleton University Ottawa, Canada

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    Language: English - Date: 2013-07-03 09:36:38