DEFCON 17. Hacking 40?000 passwords, or how to explain to your roommate why the electricity bill has increased. Part 2

DEFCON 17. Hacking 40?000 passwords, or how to explain to your roommate why the electricity bill has increased. Part 1
 
 
If you do not follow any rules for creating passwords, the password may look like a simple list of PHP . People hate rules, hate phrases and do not want to use them. If you give them the will, they will type any trivial password and will assume that the deal is done. In this case, it's safer if they do not use simple base words, so it's better to use large input dictionaries.
 
 
DEFCON 17. Hacking 40?000 passwords, or how to explain to your roommate why the electricity bill has increased. Part 2  
 
The ...
+ 0 -

UPS and battery array: where to put? Yes, you wait

UPS and battery array: where to put? Yes, you waitUntil now, the problem of accumulation (accumulation) of electricity existed without any global changes, a technological breakthrough in this area no one could offer. It was the same battery Gaston Plante 1859 , modified by various auxiliary technologies and equipped with improvements in the field of electrochemical processes, the fight against the release of hydrogen, other materials of the hull, etc. At the turn of the beginning of 2000 appeared a different kind of ...
+ 0 -

Spy tricks: to remain in secret

About cryptosystems and machines was mentioned more than once in previous articles. But how to ensure the safe transfer of keys and codes, without which the work of secret services and spies would be equal to "0". There is an International Spy Museum, the exhibits of which are thousands of all sorts of spyware and accessories, often these are ordinary everyday items. Earlier, one of the resources published the top-10 of the most famous and unknown spy things of this museum. Among them (sorry, but not always items of use):
 
 
Spy tricks: to remain in secret ...
+ 0 -

Monsters after the holidays: AMD Threadripper 2990WX 32-Core and 2950X 16-Core

Part 1 Part 2 Part 3 Part 4
 
 

A new stack of AMD products


 
Monsters after the holidays: AMD Threadripper 2990WX 32-Core and 2950X 16-Core  
 
The kingdom for high performance. When it comes to data processing, bandwidth becomes a key factor: the more a user can do, the more projects will be executed, and the number of contracts will increase accordingly. Workstation users often calculate bottlenecks in the system and like to throw resources to solve the problem, whether it's core, memory, or graphics acceleration. The second-generation Threadripper, known as Threadripper ? goes beyond the old kernel-to-price ratio: the 2990WX provides 32 cores and 64 threads for just $ ...[/h]
+ 0 -

Strength check: Termite LT45? LXI

By the beginning of the 1990s, modern personal computers, simply PCs, had replaced cryptographic machines and other specialized cryptographic devices. Often, it was necessary and necessary to work with such encryption machines in the military conditions. Therefore, reliability and strength are the two most important parameters in the development and creation of military portable PCs. Remain unharmed and fully functioning, passing fire, water and copper pipes!
 
 
Strength check: Termite LT45? LXI  
CryptoMuseum
 
 
 
 
Thank you for staying with ...
+ 0 -

Bunker for the date: how I was allowed to walk through the RUVDS data center in the territory of the space mission

Bunker for the date: how I was allowed to walk through the RUVDS data center in the territory of the space missionSomeone likes to go to the movies, someone likes to go to clubs, someone likes to go to museums - and I've long dreamed of walking around data centers, looking at everything with my own eyes, chatting with those who work there. But to organize all this seemed unreal. Fortunately, a certain recognizability, which earned poiskvps.ru for these years, and which now, sometimes, surprises me - simplified the most difficult: acquaintance. So for the last two months I visited two data centers. What I saw interesting in St. Petersburg, I still plan to write later. And today I will tell you how I saw ...
+ 0 -

10 of the fastest supercomputers in the world. 2018

Two months ago, in June, the Top500 list was published. Top500 is a project to compile ratings and descriptions of the 500 most powerful publicly known computing systems in the world. The current list of supercomputers is published twice a year (June /November). The project is just celebrating its anniversary (25 years) and, what can not but rejoice, the list was updated in comparison with the previous ones, it included 133 new systems, and the first places are occupied by new favorites.
 
 
10 of the fastest supercomputers in the world. 2018  
 
It seems that they accumulated all the world's digatal power. Meet the 10 fastest supercomputers in the world ...
+ 0 -

The Intel Core i7-8086K (Part 4)

The Intel Core i7-8086K (Part 4) Part 1 Part 2 Part 3 Part 4
 
 

Performance with Overclocking: CPU tests


 
We demonstrated our overclocking results, where we managed to achieve stable operation of the processor at a frequency of 5.1 GHz with a significant increase in voltage. However, working at 5.1 GHz frequency has raised the operating temperature dangerously high, so for our testing we returned back to 5.0 GHz and again performed a series of tests at this increased speed. We also conducted some tests on a standard frequency, but with increased frequencies of DRAM. We launched DRAM in our ASRock system on ...[/h]
+ 0 -

Anti-Piracy Wars - The Empire Strikes Back

+ 0 -

In the search for a successor to KL-7: RACE and AROFLEX

In the search for a successor to KL-7: RACE and AROFLEXAdvanced version of the German encryption machine Enigma KL-7 was developed by the National Security Agency (NSA) in the United States. It was put into operation in 1952 and for many years served as the main cryptographic machine of the US and NATO. The device was code-named ADONIS (high level) and POLLUX (low level), depending on the level of secrecy of the keys. KL-7 remained in service until the 1970s, later some countries operated the KL-7 as a backup device. June 3? 1983 the Canadian Navy sent the last message from the KL-7. The encryption machine was replaced by a number of electronic ...
+ 0 -