Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment: Not exactly (Score 2) 192

by ptrourke (#40259641) Attached to: LinkedIn Password Leak: Salt Their Hide
If you're looking for hash collisions, you're not going to target a particular hash; you're going to leverage the magic of the birthday paradox and hash your way through a dictionary with passwords listed in order of decreasing probability (with "password" and "12345" listed first, then "p@ssw0rd" and "OU812", etc.) and match the resulting hash with entries in the password file. And you're going to do this once, building one rainbow table, and try it on every unsalted, SHA1 hashed password list you can get your grubby hands on, until you have a nice little dictionary of username / password pairs - and try it on whatever services you're targeting, because most people tend to reuse the same password over and over again (usually Joshua97 or MaryJune05 or some other combination of their kids' names and birthdates).

Comment: Re:Quit making excuses (Score 1) 361

by ptrourke (#36109678) Attached to: BSA 2010 Piracy Report: $58.8 Billion

I have been posting anonymously for years; I also have another account that I usually use when I want to post something and get some feedback. But I wanted to log in to my original account, with my real name, to post just this short comment:

You, my friend, are a sensible human being. That's all I have to say.

To restore a sense of reality, I think Walt Disney should have a Hardluckland. -- Jack Paar

Working...