OZONE Asylum
Forums
OZONE
Let's talk about computer security for a moment
This page's ID:
27664
Search
QuickChanges
Forums
FAQ
Archives
Register
Edit Post
Who can edit a post?
The poster and administrators may edit a post. The poster can only edit it for a short while after the initial post.
Your User Name:
Your Password:
Login Options:
Remember Me On This Computer
Your Text:
Insert Slimies »
Insert UBB Code »
Close
Last Tag
|
All Tags
UBB Help
[quote] [b]HZR said:[/b] You always hope to get lucky when brute forcing. I don't see how random jumps would help, rather the opposite, since there is a probability that you try the same key twice (or more). [/quote] You would obviously keep track of which combinations have been testes to avoid that. I'm just making suggestions here, I've never needed to bruteforce a pass so I don't really know which methods would be most effective. [quote]A good passphrase would never be vulnerable to dictionary/hybrid attacks.[/quote] Who said everyone uses good passphrases, even if they are supposed to? I know for sure I don't at all times, but that's my problem... [quote] Yes, but the probability that you find a good passphrase during your lifetime is close to non-existent. [/quote] Not if you have the right resources. You'd have to be really desperate to do it with a single machine.;) I guess you missed my last paragraph about that. :P Anyway, the possibility to crack the pass using bruteforcing is very real, no matter if it takes time or not. If it's still valid is a different matter. /TwoD
Loading...
Options:
Enable Slimies
Enable Linkwords
« Backwards
—
Onwards »