password cracker

  • 11Crackerjack (disambiguation) — Crackerjack may refer to:* Crackerjack , a British children s comedy television series, running from 1955 until 1984. * Cracker Jack, a snack consisting of caramel coated popcorn and peanuts. * Crackerjack (film), a 2002 Australian comedy. *… …

    Wikipedia

  • 12Перебор по словарю — (англ. dictionary attack)  атака на систему защиты, использующая метод полного перебора (англ. brute force) предполагаемых паролей, используемых для аутентификации, осуществляемого путем последовательного пересмотра всех слов… …

    Википедия

  • 13Security Accounts Manager — The Security Accounts Manager (SAM) is a database stored as a registry file in Windows NT, Windows 2000, and later versions of Windows. It stores users passwords in a hashed format (in an LM hash and an NTLM hash). Since a hash function is one… …

    Wikipedia

  • 14MD5 — General Designers Ronald Rivest First published April 1992 Series MD2, MD4, MD5, MD6 Detail Digest sizes 128 bits …

    Wikipedia

  • 15L0pht — Infobox computer underground group name = L0pht Heavy Industries caption = LHI Logo origin = Boston, Massachusetts country = United States status = inactive years active = 1992 ndash;2000 category = hacker think tank founders = Count Zero White… …

    Wikipedia

  • 16Quantum computer — A quantum computer is a device for computation that makes direct use of distinctively quantum mechanical phenomena, such as superposition and entanglement, to perform operations on data. In a classical (or conventional) computer, information is… …

    Wikipedia

  • 17Robert Hanssen — For those of a similar name, see Robert Hanson (disambiguation). Robert Hanssen Robert Hanssen Born April 18, 1944 (1944 04 18) (age 67) Chicago, Illinois …

    Wikipedia

  • 18Serge Vaudenay — (5 April 1968 ) is a well known French cryptographer.Serge Vaudenay entered the École Normale Supérieure in Paris as a normalien student in 1989. In 1992, he passed the agrégation in mathematics. He did his PhD at the computer science laboratory… …

    Wikipedia

  • 19Point-to-point tunneling protocol — The Point to Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. Layer 2 Tunneling Protocol (L2TP) [ [http://www.ietf.org/rfc/rfc2661.txt Layer Two Tunneling Protocol L2TP ] ,RFC 2661, W. Townsley et al. ,August …

    Wikipedia

  • 20Zardoz (computer security) — The Zardoz list, more formally known as the Security Digest list, was a famous semi private full disclosure mailing list run by Neil Gorsuch from 1989 through 1991. Zardoz is most notable for its status as a perennial target for computer hackers …

    Wikipedia