John the Ripper

Results: 55



#Item
1Cryptography / Computer access control / Computer security / Password / Security / Brute-force attack / Hashcat / John the Ripper / Crypt / Guessing / Security hacker / Password fatigue

Measuring Real-World Accuracies and Biases in Modeling Password Guessability Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek† , Willi

Add to Reading List

Source URL: www.blaseur.com

Language: English - Date: 2015-08-12 14:36:57
2

Grid Implemented John the Ripper aka GI John Bucsay Balázs

Add to Reading List

Source URL: rycon.hu

Language: Hungarian - Date: 2009-09-20 17:21:26
    3

    http://www.petur.euJúní 2010 John the Ripper á UbuntuMPI Cluster

    Add to Reading List

    Source URL: download.openwall.net

    Language: English - Date: 2010-06-17 15:01:32
      4

      Parallelization of John the Ripper (JtR) using MPI Ryan Lim Computer Science and Engineering University of Nebraska–Lincoln Lincoln, NE

      Add to Reading List

      Source URL: download.openwall.net

      Language: English - Date: 2004-01-22 15:13:38
        5

        Parallelization of John the Ripper (JtR) using MPI Ryan Lim Computer Science and Engineering University of Nebraska–Lincoln Lincoln, NE

        Add to Reading List

        Source URL: download.openwall.net

        Language: English - Date: 2004-01-22 15:13:38
          6Password / Key management / Crypt / John the Ripper / Key derivation function / Brute-force attack / Passwd / Botnet / OTPW / Cryptography / Computer security / Security

          Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger lstclair, johansen, enck, pirretti, traynor, mc

          Add to Reading List

          Source URL: nsrc.cse.psu.edu

          Language: English - Date: 2015-04-16 15:07:31
          7Access control / Identity management / Password / Salt / Passphrase / John the Ripper / Crypt / Security token / OTPW / Security / Computer security / Cryptography

          The Tangled Web of Password Reuse Anupam Das∗ , Joseph Bonneau† , Matthew Caesar∗ , Nikita Borisov∗ and XiaoFeng Wang‡ ∗ University of Illinois at Urbana-Champaign {das17, caesar, nikita}@illinois.edu

          Add to Reading List

          Source URL: web.engr.illinois.edu

          Language: English - Date: 2013-12-13 12:04:32
          8Access control / Identity management / Password / Cryptographic software / Passphrase / Salt / LastPass Password Manager / John the Ripper / Crypt / Security / Computer security / Cryptography

          A A Large-Scale Evaluation of High-Impact Password Strength Meters XAVIER DE

          Add to Reading List

          Source URL: users.encs.concordia.ca

          Language: English - Date: 2015-02-27 14:07:09
          9Password / Salt / Passwd / John the Ripper / Key derivation function / Crypt / Password strength / OTPW / Cryptography / Computer security / Security

          CERIAS Tech ReportErsatzPasswords Ending Password Cracking by Mohammed H. Almeshekah, Christopher N. Gutierrez, Mikhail J. Atallah and Eugene H. Spafford Center for Education and Research Information Assurance an

          Add to Reading List

          Source URL: www.cerias.purdue.edu

          Language: English - Date: 2015-02-13 11:29:28
          10Cryptography / Password / John the Ripper / L0phtCrack / Crack / L0pht / MARC / Computer security / Software / System software

          PDF Document

          Add to Reading List

          Source URL: www.korelogic.com

          Language: English - Date: 2015-05-18 15:05:43
          UPDATE