Please create an account to participate in the Slashdot moderation system


Forgot your password?
Slashdot Deals: Cyber Monday Sale Extended! Courses ranging from coding to project management - all eLearning deals 20% off with coupon code "CYBERMONDAY20". ×

Submission + - AMD FX CPU Reviews (

I.M.O.G. writes: "Today AMD lifted embargo on their most recent desktop AMD FX architecture, code named Bulldozer, whose CPU frequency record Slashdot recently covered. The fruition of 6 years of AMD R&D, this new chip architecture is the most significant news out of AMD since the Phenom II made its debut. The chips are available now in all major retail outlets and top tier hardware sites have published the first Bulldozer reviews already. Without spoiling the news, expect a mixed bag of opinions."

Submission + - Remotely Hacking Cars (

An anonymous reader writes: TheTruthAboutCars blogs about a new paper from security researchers at UC San Diego and the University of Washington that demonstrates multiple ways in which a car can be remotely taken over (technical details here). The paper is pretty amazing in general, but they drop the bomb when they take over a car 1000 miles away just by calling it through the car's built-in cell phone interface, upload an IRC client for control (I kid you not! Can you say "car botnet"?) and then track the car via GPS and listen in to everything that is being said inside. James Bond eat your heart out!

Submission + - WPA/WPA2 Cracking with CPUs, GPUs, and the Cloud (

wintertargeter writes: Yeah, it's another article on security, but this time we finally get a complete picture. Tom's Hardware looks at WPA/WPA2 brute-force cracking with CPUs, GPUs, and Amazon's Nvidia Tesla-based EC2 cloud servers.

Verdict? WPA/WPA2 is pretty damn secure. Now to wait for a side-channel attack. Sigh....

Comment Re:Umm... (Score 1) 128

Wow you really know nothing about encryption. Sigh.. Everyone is an expert. Zdnet looked at ighashgpu that's unsalted password decryption when you already have a precomputed hash table. TH looked at salted password decryption where you have to perform a SHA-1 transformation invocation thousands of times per every password attempt.

Comment Re:So.... (Score 1) 128

rainbow tables only work on unsalted passwords. These were used by microsoft for 'lan' style passwords. IIRC, vista and win7 don't use these. And if you use a 14 character password or longer, even windows xp disables the lan encryption. Your rainbow tables are effectively useless against aes-128, aes-256, and even des. They simply precompute password hashes, and generating the tables takes quite a long time. Using rainbow tables has nothing to do with gpu acceleration.

Comment Re:Umm... (Score 2) 128

No. Zdnet used ighashgpu. That's a hash cracker. WinZip and WinRAR encyption is different because it's based on precomputed password hashes. It looks like TH used AccentZip and AccentWinRAR to decrypt passwords.All three programs are created by Ivan Golubev. His blog is full of posts on cryptography performance.

"You need tender loving care once a week - so that I can slap you into shape." - Ellyn Mustard