Last month I wrote a column in which I discussed my attempts at cracking passwords in a lab environment. I had intended for the blog post to be a thought exercise. I constantly hear people ...
Rainbow Method and Table creator Phillip Oechslin emailed me regarding my recent column on Rainbow tables. Here's his email. Hello Roger, I just saw your online article on CSO online in Australia. I ...
Want to listen in on cellphone calls or intercept test messages? Well that’s a violation of someone else’s privacy so shame on you! But there are black-hats who want to do just that and it may not be ...
The hash function is a function that can convert a character string to another character string, and it is possible to calculate the character string after conversion from the character string before ...
Common password encryption formats used by programs such as Microsoft’s LAN Manager have, since the mid-1990s, been vulnerable to brute force attacks like the infamous l0phtcrack. A brute force attack ...
If you've ever watched TV and movies about cybersecurity, you probably envision someone sitting in a dark room trying to guess someone else's password based on a few facts like their kids' names or ...