Sunday, August 21, 2016
Saturday, August 20, 2016
Ok, guys, I'm going to sleep now :) Before I go, I want to quickly explain to all those following this without understanding chit what's about; the authority port, the world internet authorithy (port 53) runs a trellis encryption; trellis is a 3 D system of geometric figures, where each vector of the 3D has a lapse of time (TTL) until can be shut off (like gmail which only can be reopened in 300 seconds) and a velocity of bites running on diffrent paths of volume (packets) , however (this is called convunational) trellis has a file i.cnm which has a task to forward, retransmit and reset all data traffic on world internet; what I've been doing was to use the forwrd aspect, which on the last code I published is about to reverse the lenght (firewall) , when we reverse the trellis path we are making possible a forward pool; this means that this is is the midlea aspect of shutting down worldwide internet. So, I'll be here tomorrow God's wishing; and He does. see u bye bye.
1
30 #include <itpp/base/matfunc.h>
31 #include <itpp/base/algebra/schur.h>
32 #include <itpp/base/converters.h>
41 cmat sqrtm(const mat& A)
47 cmat sqrtm(const cmat& A)
50 schur(A, U, T);
57 R(j, j) = std::sqrt(T(j, j));
59 const double fudge = std::sqrt(std::numeric_limits::min ());
70 const std::complex conj_d = conj(d);
80 bool all(const bvec &testvec)
87 bool any(const bvec &testvec)
92 }
Convert convolutional code polynomials to trellis description
http://www.mathworks.com/help/comm/ref/poly2trellis.html
Friday, August 19, 2016
DNSSEC: Does the algorithm of the ZSK need to match the algorithm of the KSK?
Is it legal with DNSSEC to have differing algorithms for the ZSK and
KSK? If so, how can I sign verify the zone using the standard
...
Well, as much as the tools complain about it, it does appear to work:
http://security.stackexchange.com/questions/80493/dnssec-does-the-algorithm-of-the-zsk-need-to-match-the-algorithm-of-the-ksk
https://kernel.googlesource.com/pub/scm/linux/kernel/git/broonie/regulator/+/regulator-v4.0-rc2%5E3..regulator-v4.0-rc2/
bind
DNSSEC tools with such a configuration?...
Well, as much as the tools complain about it, it does appear to work:
dig voria.net +dnssec +multi
isn't giving me any errors.http://security.stackexchange.com/questions/80493/dnssec-does-the-algorithm-of-the-zsk-need-to-match-the-algorithm-of-the-ksk
kernel, ok, microvolts code here so you don't need clusters you need a microvolt regulator
https://kernel.googlesource.com/pub/scm/linux/kernel/git/broonie/regulator/+/regulator-v4.0-rc2%5E3..regulator-v4.0-rc2/
ICANN selected seven people to be key holders and gave each one an actual key to Internet. It selected seven more people to be backup keyholders: so total 14 people. The physical keys unlock safety deposit boxes stashed around the world. Inside those boxes, there are smart key cards. If they all combine seven smart key cards together then they will have the “master key.” The master key may be a computer code or a password that can be used to access the ICANN database.
ICANN has released the list of trusted community representatives who
will participate in the root key generation and signing ceremonies, the
first of which will take place tomorrow, June 16, in Culpeper,
Virginia. (An FAQ on the trusted community representatives can be found
here.) Following is the complete list, although ICANN notes that backups may be called in if needed:
Crypto Officers for the US East Coast Facility
Crypto Officers for the US East Coast Facility
- Alain Aina, BJ
- Anne-Marie Eklund Löwinder, SE
- Federico Neves, BR
- Gaurab Upadhaya, NP
- Olaf Kolkman, NL
- Robert Seastrom, US
- Vinton Cerf, US
- Andy Linton, NZ
- Carlos Martinez, UY
- Dmitry Burkov, RU
- Edward Lewis, US
- João Luis Silva Damas, PT
- Masato Minda, JP
- Subramanian Moonesamy, MU
- Bevil Wooding, TT
- Dan Kaminsky, US
- Jiankang Yao, CN
- Moussa Guebre, BF
- Norm Ritchie, CA
- Ondřej Surý, CZ
- Paul Kane, UK
- Christopher Griffiths, US
- Fabian Arbogast, TZ
- John Curran, US
- Nicolas Antoniello, UY
- Rudolph Daniel, UK
- Sarmad Hussain, PK
- Ólafur Guðmundsson, IS
- David Lawrence, US
- Dileepa Lathsara, LK
- Jorge Etges, BR
- Kristian Ørmen, DK
- Ralf Weber, DE
- Warren Kumari, US
Tuesday, August 16, 2016
Thursday, August 11, 2016
Saturday, August 6, 2016
Hash Cracking with Rainbow Tables
This document explains the rcrack program. The rcrack program lookup
existing rainbow tables for the plaintext of user supplied hash.
Six similar programs are available:
http://project-rainbowcrack.com/crack.htm
Six similar programs are available:
http://project-rainbowcrack.com/crack.htm
HashKiller.co.uk allows you to input an NTLM hash and search for its decrypted state in our database, basically, it's a NTLM cracker / decryption tool.
We have a total of just over 312.072 billion unique decrypted NTLM hashes since August 2007.
Please input the NTLM hashes that you would like to be converted into text / cracked / decrypted. NOTE that space character is replaced with [space]:
Please note the password is after the : character, and the NTLM hash is before it.
https://hashkiller.co.uk/ntlm-decrypter.aspx
Please input the NTLM hashes that you would like to be converted into text / cracked / decrypted. NOTE that space character is replaced with [space]:
Please note the password is after the : character, and the NTLM hash is before it.
https://hashkiller.co.uk/ntlm-decrypter.aspx
Subscribe to:
Posts (Atom)