Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
AMD

+ - AMD FX CPU Reviews->

Submitted by
I.M.O.G.
I.M.O.G. writes "Today AMD lifted embargo on their most recent desktop AMD FX architecture, code named Bulldozer, whose CPU frequency record Slashdot recently covered. The fruition of 6 years of AMD R&D, this new chip architecture is the most significant news out of AMD since the Phenom II made its debut. The chips are available now in all major retail outlets and top tier hardware sites have published the first Bulldozer reviews already. Without spoiling the news, expect a mixed bag of opinions."
Link to Original Source
Security

+ - Remotely Hacking Cars->

Submitted by Anonymous Coward
An anonymous reader writes "TheTruthAboutCars blogs about a new paper from security researchers at UC San Diego and the University of Washington that demonstrates multiple ways in which a car can be remotely taken over (technical details here). The paper is pretty amazing in general, but they drop the bomb when they take over a car 1000 miles away just by calling it through the car's built-in cell phone interface, upload an IRC client for control (I kid you not! Can you say "car botnet"?) and then track the car via GPS and listen in to everything that is being said inside. James Bond eat your heart out!"
Link to Original Source
Security

+ - WPA/WPA2 Cracking with CPUs, GPUs, and the Cloud->

Submitted by wintertargeter
wintertargeter (2012914) writes "Yeah, it's another article on security, but this time we finally get a complete picture. Tom's Hardware looks at WPA/WPA2 brute-force cracking with CPUs, GPUs, and Amazon's Nvidia Tesla-based EC2 cloud servers.

Verdict? WPA/WPA2 is pretty damn secure. Now to wait for a side-channel attack. Sigh...."

Link to Original Source

Comment: Re:Umm... (Score 1) 128

by wintertargeter (#36509364) Attached to: Brute-Force Password Cracking With GPUs
Wow you really know nothing about encryption. Sigh.. Everyone is an expert. Zdnet looked at ighashgpu that's unsalted password decryption when you already have a precomputed hash table. TH looked at salted password decryption where you have to perform a SHA-1 transformation invocation thousands of times per every password attempt.

Comment: Re:So.... (Score 1) 128

by wintertargeter (#36504290) Attached to: Brute-Force Password Cracking With GPUs
rainbow tables only work on unsalted passwords. These were used by microsoft for 'lan' style passwords. IIRC, vista and win7 don't use these. And if you use a 14 character password or longer, even windows xp disables the lan encryption. Your rainbow tables are effectively useless against aes-128, aes-256, and even des. They simply precompute password hashes, and generating the tables takes quite a long time. Using rainbow tables has nothing to do with gpu acceleration.

Comment: Re:Umm... (Score 2) 128

by wintertargeter (#36504168) Attached to: Brute-Force Password Cracking With GPUs
No. Zdnet used ighashgpu. That's a hash cracker. WinZip and WinRAR encyption is different because it's based on precomputed password hashes. It looks like TH used AccentZip and AccentWinRAR to decrypt passwords.All three programs are created by Ivan Golubev. His blog is full of posts on cryptography performance.

"If you don't want your dog to have bad breath, do what I do: Pour a little Lavoris in the toilet." -- Comedian Jay Leno

Working...