Tuesday, December 27, 2011

Merry christmas

Merry Christmas everyone -Posted from my IPhone 4S

Location:Okemos Rd,,United States

Wednesday, December 7, 2011

GPU Password Cracking

We used to have a little comfort that if someone got a hole of your password hashes, it would at least take them considerable time to crack and extract the passwords.

Those days are gone !

Brute force cracking password hashes is becoming too easy thanks to apps that make use of the multiple cores in graphics cards.

CPU Password cracking

Core 2 Duo 2.13 GHz - 2.5 Million Hashes / Second

Core i7 980x - 19. Million Hashes / Second

GPU Password cracking


Radeon HD 5830 ($109) - 290 Million Hashes / Second

Radeon HD 6990 (($740) - 760 Million Hashes / Second


Multi GPU setups can achieve staggering rates of performance.

The White Pixel system (http://whitepixel.zorinaq.com/) has 4 AMD Radeon HD 5970 graphics cards and custom software. (each 5970 Card has dual GPU ‘s and costs around $400).

it can churn through more than 33 Billion Password hashes per second.

What's the best Alternative to passwords ?

-Posted from my IPhone 4S

Tuesday, December 6, 2011

Honeypot Folders

Everyone knows that a honeypot server is a system on the network which contains what appears to be juicy valuable PHI or other confidential data.
I recently heard mention of setting up a system using honeypot folders on servers as a easier and cheaper alternative.

Basically, you can do the following.
1. Configure a folder on each server and place one or several documents in it which appear to contain confidential data. The folder name should indicate that it is important, like “Accounting Backup Data” but the data within it is actually fake and may even be misleading.

2. Notify users that the folder is not to be accessed.


3. Configure logging of all access to the folder and also alerting

Should an intruder gain access into the network, they will almost certainly look in the folder, which will generate and aid in their detection.



1. Configure a folder on each server and place one or several documents in it which appear to contain confidential data. The folder name should indicate that it is important, like “Accounting Backup Data” but the data within it is actually fake and may even be misleading.

2. Notify users that the folder is not to be accessed.


3. Configure logging of all access to the folder and also alerting

Should an intruder gain access into the network, they will almost certainly look in the folder, which will generate and aid in their detection.


-Posted from my IPhone 4S

Location:Okemos Rd,,United States

Friday, December 2, 2011

iPhone 4s rocks

After 3 weeks I'm still enjoying my work iPhone 4s.
Siri has issues with my new Zealand accent but short commands work ok.

Just need to migrate from my Motorola zoom to an iPad next.




-Posted from my IPhone 4S

Location:Work