If you've ever watched TV and movies about cybersecurity, you probably envision someone sitting in a dark room trying to guess someone else's password based on a few facts like their kids' names or ...
The hash function is a function that can convert a character string to another character string, and it is possible to calculate the character string after conversion from the character string before ...
Last month I wrote a column in which I discussed my attempts at cracking passwords in a lab environment. I had intended for the blog post to be a thought exercise. I constantly hear people ...
Common password encryption formats used by programs such as Microsoft’s LAN Manager have, since the mid-1990s, been vulnerable to brute force attacks like the infamous l0phtcrack. A brute force attack ...
In this next installment of my ongoing PowerShell series, I want to focus on putting PowerShell objects to work for you. Let me warn you in advance, however: Put on your advanced thinking caps for ...
The first time I heard about hash tables was after taking a compilers course during my BSc. The truth is, I was not able to understand and appreciate their usefulness fully back then. Now that I know ...
I had an interesting realization tonight: I'm terrified of hash tables. Specifically, my work on JRuby (and even more directly, my work optimizing JRuby) has made me terrified to ever consider using a ...