It sounds like the sysadmins’ worst dream: Microsoft publishes a patch addressing a current problem and just a couple of hours later the world has to face tons of attacks regarding this issue. Before we disconnect the network and run around in panic, let’s have a look at the facts. In my opinion it’s just a matter of […]
This is now the official end on cracking generated passwords here. After running for 77 days and 3 hours not even a single password was cracked. So this is the last status report: guesses: 0 time: 77:03:40:35 c/s: 971 trying: 055ud And that’s all folks. Hope you’ve enjoyed the experiment.
If you try to go over the top with some things, then you should really do it instead of just using some tiny hacks. What about logging into your computer using a mobile phone? Sounds cool, huh? So let’s use it and get to work. As the title already says, you will need a bluetooth enabled phone, a […]
Fifty days have passed since John The Ripper started cracking on the password file. As you can see, not even one password was guessed by now: guesses: 0 time: 50:06:35:40 c/s: 972 trying: ns4k7y Regarding my password policy, which is changing my passwords every month, our attacker would have lost already. I’ll proceed with the cracking for a […]
How can you verify the integrity of some files as simple as possible? How can you check for manipulations or transmission failures? The question is answered quite simple: Checksums. One of the most common checksum techniques out there is MD5 which stands for Message Digest Version 5. The fine thing about md5 is, that it’s just a checksum […]
That I am lazy if it comes to typing much shouldn’t be a secret by now, but mentioning it here might be wrong too – but it was the main cause for doing some research for an alternative login method. Fingerprints may sound fun, but if it comes to security or if you need to pass on the […]