vault backup: 2023-10-27 19:03:01
This commit is contained in:
10
SS23/English/KW17.md
Normal file
10
SS23/English/KW17.md
Normal file
@@ -0,0 +1,10 @@
|
||||
# p 14
|
||||
## 1
|
||||
| | advantage | disadvantage |
|
||||
| --- | ------------------------------------- | --------------------------- |
|
||||
| 1 | non electronic | not convenient |
|
||||
| 2 | easy, voice | wiretapping |
|
||||
| 3 | easy, text | no emotions |
|
||||
| 4 | only accessable from inside(security) | same(convenience) |
|
||||
| 5 | easy | some company has it as well |
|
||||
| 6 | broadcast | need someone to present |
|
||||
21
SS23/English/KW18.md
Normal file
21
SS23/English/KW18.md
Normal file
@@ -0,0 +1,21 @@
|
||||
- People get your password by
|
||||
- Cracking a database
|
||||
- try out passwords until a hash matches up
|
||||
- try that password on other accounts
|
||||
- Hashcat
|
||||
- utilizes GPU
|
||||
- 10 billion hashes per second per gpu
|
||||
- 4 Titan X
|
||||
- different hash algorithms
|
||||
- MD5 (unsecure)
|
||||
- SHA-512 (better)
|
||||
- better hash takes longer
|
||||
- password cracking strategies
|
||||
- brute force
|
||||
- seven lower case letters in 1 second
|
||||
- characters ^ amount of characters
|
||||
- dictonary attack
|
||||
- common passwords
|
||||
- normal words
|
||||
- combinations
|
||||
- small changes (at to @)
|
||||
0
SS23/English/KW21.md
Normal file
0
SS23/English/KW21.md
Normal file
9
SS23/English/KW26.md
Normal file
9
SS23/English/KW26.md
Normal file
@@ -0,0 +1,9 @@
|
||||
- System doesn't boot
|
||||
- It gets past the bios
|
||||
- Your physical components are all detected
|
||||
- Temps are ok
|
||||
- No bootloop, just stuck
|
||||
- SSD is working
|
||||
|
||||
|
||||
Problem: Bootloader is deleted
|
||||
Binary file not shown.
Reference in New Issue
Block a user