On Sun, Jan 11, 2015 at 4:37 AM, Ric Moore <wayward4...@gmail.com> wrote:
> You all may wish to read this, from ars technica:
> http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/1/
>
> Very interesting. So interesting that I downloaded cudahashcat. I have 96
> cuda cores, and it was running the sample program quickly as it tore into 6
> char / 2 numeral paaswd combinations. :) Ric

Good for you.

That article did a much better job of talking about cracking
pswords/passcodes/passphrases than my ramble did.

> p/s for the sake of $deity, please TRIM these posts!!

Heh.

Still trying to figure out how I pasted that post into the middle of
the post. I was dozing of, I'm sure that had something to do with it.
:-/

-- 
Joel Rees

Taking a nap is not a good time to practice recursion.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/caar43ipcdjqr4mugvm81s_anpk26cmrsgh8x3rndkkqdopa...@mail.gmail.com

Reply via email to