On 8/12/2014 12:30 PM, Greg Freemyer wrote:
On the other-hand, the system I linked to before (http://www.techspot.com/news/51044-25-gpu-cluster-can-brute-force-windows-pa...) can brute force the full 16-char password space of Windows 2003 in 5.5 hours.
You should have read all the way to the bottom of that article where it points out:
It's worth pointing out that this method typically only applies to offline attacks due to the fact that most websites limit the number of incorrect password guesses before either locking the account down or enforcing a waiting period.
When each possible decryption MUST BE TESTED, it really doesn't matter how fast your hardware is. UNLESS of course the decryption yields mountains of gibberish except for the ONE decryption that stands out clearly: DogKilledByApe,News@11 -- _________________________________ ---This space for rent--- -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org