SlideShare une entreprise Scribd logo
1  sur  43
Télécharger pour lire hors ligne
So,What’sinaPassword?
Presentedby /RobGillen @argodev
Thisworkislicensedundera .
Thistalkandrelatedresourcesareavailableonline:
CreativeCommonsAttribution4.0InternationalLicense
https://github.com/argodev/talks/
Don'tbeStupid
Thefollowingpresentationdescribesrealattacksonreal
systems.Pleasenotethatmostoftheattacksdescribedwould
beconsideredILLEGALifattemptedonmachinesthatyoudonot
haveexplicitpermissiontotestandattack.Iassumeno
responsibilityforanyactionsyouperformbasedonthecontent
ofthispresentationorsubsequentconversations.
Pleaserememberthisbasicguideline:Withknowledgecomes
responsibility.
Disclaimer
Thecontentofthispresentationrepresentsmypersonalviews
andthoughtsatthepresenttime.Ireservetherighttochange
myviewsandopinionsatanytime.Thiscontentisnotendorsed
by,orrepresentativeinanywayofmyemployernorisit
intendedtobeaviewintomyworkorareflectiononthetype
ofworkthatIormygroupperforms.Itissimplyahobbyand
personalinterestandshouldbeconsideredassuch.
PasswordAttacks
AYearinReview
PixelFederation
InDecember2013,abreachoftheweb-basedgamecommunity
basedinSlovakiaexposedover38,000accountswhichwere
promptlypostedonline.Thebreachincludedemailaddressesand
unsaltedMD5hashedpasswords,manyofwhichwereeasily
convertedbacktoplaintext.
http://haveibeenpwned.com/
Vodafone
InNovember2013,VodafoneinIcelandsufferedanattack
attributedtotheTurkishhackercollective"Maxn3y".Thedata
wasconsequentlypubliclyexposedandincludedusernames,
emailaddresses,socialsecuritynumbers,SMSmessage,server
logsandpasswordsfromavarietyofdifferentinternal
sources.
http://haveibeenpwned.com/
Adobe
Thebigone.InOctober2013,153millionaccountswere
breachedwitheachcontaininganinternalID,username,email,
encryptedpasswordandapasswordhintinplaintext.The
passwordcryptographywaspoorlydoneandmanywerequickly
resolvedbacktoplaintext.Theunencryptedhintsalso
disclosedmuchaboutthepasswordsaddingfurthertotherisk
thathundredsofmillionsofAdobecustomersalreadyfaced.
http://haveibeenpwned.com/
Twitter
February2013-Thisweek,wedetectedunusualaccesspatterns
thatledtousidentifyingunauthorizedaccessattemptsto
Twitteruserdata.Wediscoveredoneliveattackandwereable
toshutitdowninprocessmomentslater.However,our
investigationhasthusfarindicatedthattheattackersmay
havehadaccesstolimiteduserinformation–usernames,email
addresses,sessiontokensandencrypted/saltedversionsof
passwords–forapproximately250,000users.
https://blog.twitter.com/2013/keeping-our-users-secure
More...
cvideo.co.il–10/15/2013–3,339
penangmarathon.gov.my–10/8/2013–1,387
tomsawyer.com–10/6/2013–57,462
ahashare.com–10/3/2013–169,874
http://hackread.com/iranian-hackers-hack-israeli-job-site/
http://www.cyberwarnews.info/2013/10/07/45000-penang-
marathon-participants-personal-details-leaked/
http://www.cyberwarnews.info/2013/10/07/software-company-
tom-sawyer-hacked-61000-vendors-accounts-leaked/
http://www.cyberwarnews.info/2013/10/04/ahashare-com-
hacked-complete-database-with-190-000-user-credentials-
leaked/
https://shouldichangemypassword.com/all-sources.php
More...
UnknownIsraeliwebsite–7/30/2013–26,064
UKemails–7/17/2013–8,002
UKemails(part2)–7/17/2013–7,514
http://www.pakistanintelligence.com–5/27/2013–75,942
http://hackread.com/opizzah-opisrael-phr0zenmyst-claims-
to-leak-login-details-of-33895-israelis/
http://www.techworm.in/2013/07/more-than-15000-emails-
username-and.html
http://www.techworm.in/2013/07/more-than-15000-emails-
username-and.html
http://www.ehackingnews.com/2013/05/pakistan-intelligence-
job-board-website.html
https://shouldichangemypassword.com/all-sources.php
More...
McDonaldsTaiwan–3/27/2013–185,620
karjera.ktu.lt–3/14/2013–14,133
avadas.de–3/9/2013–3,344
angloplatinum.co.za–3/5/2013–7,967
http://www.cyberwarnews.info/2013/03/28/official-
mcdonalds-austria-taiwan-korea-hacked-over-200k-
credentials-leaked/
http://www.cyberwarnews.info/2013/03/14/14000-student-
credentials-leaked-from-ktu-career-center-lithuania/
http://hackread.com/avast-germany-website-hacked-defaced-
20000-user-accounts-leaked-by-maxney/
http://thehackernews.com/2013/03/worlds-largest-platinum-
producer-hacked.html
https://shouldichangemypassword.com/all-sources.php
More...
angloplatinum.com–3/5/2013–723
Walla.co.il–2/19/2013–531,526
BankExecutives–2/4/2013–4,596
bee-network.co.za–1/29/2013–81
http://thehackernews.com/2013/03/worlds-largest-platinum-
producer-hacked.html
http://www.haaretz.com/news/national/anonymous-activists-
hack-into-600-000-israeli-email-accounts.premium-1.504093
http://www.zdnet.com/anonymous-posts-over-4000-u-s-bank-
executive-credentials-7000010740/
http://www.ehackingnews.com/2013/01/projectsunrise-team-
ghostshell-leaked.html
https://shouldichangemypassword.com/all-sources.php
More...
omni-id.com–1/29/2013–1,151
moolmans.com–1/29/2013–117
servicedesk.ufs.ac.za–1/29/2013–3,952
servicedesk.ufs.ac.za(part2)–1/29/2013–355
http://www.ehackingnews.com/2013/01/projectsunrise-team-
ghostshell-leaked.html
http://www.ehackingnews.com/2013/01/projectsunrise-team-
ghostshell-leaked.html
http://www.ehackingnews.com/2013/01/projectsunrise-team-
ghostshell-leaked.html
http://www.ehackingnews.com/2013/01/projectsunrise-team-
ghostshell-leaked.html
https://shouldichangemypassword.com/all-sources.php
More...
westcol.co.za–1/29/2013–99
digital.postnet.co.za–1/29/2013–45,245
FrenchChamberofCommerce–1/29/2013–515
http://www.ehackingnews.com/2013/01/projectsunrise-team-
ghostshell-leaked.html
http://www.ehackingnews.com/2013/01/projectsunrise-team-
ghostshell-leaked.html
http://news.softpedia.com/news/French-Chamber-of-Commerce-
and-Industry-Portal-Hacked-by-Tunisian-Cyber-Army-
324716.shtml
https://shouldichangemypassword.com/all-sources.php
TypesofAttacks
AlgorithmWeakness
ImplementationWeaknesses
DictionaryAttacks
Brute-ForceAttacks
MaskAttacks
AlgorithmicWeaknesses
Collision,SecondPre-Image,Pre-Image
Confirmed:
GOST,HAVAL,MD2,MD4,MD5,PANAMA,RadioGatun,RIPEMD,
RIPEMD-160,SHA-0,SHA-1,Tiger(2)–192/160/128,
WHIRLPOOL
Theoretical:
SHA-256/224
SHA-512/384
http://en.wikipedia.org/wiki/Cryptographic_hash_function
AccountHashes
WindowsHash
EAD0CC57DDAAE50D876B7DD6386FA9C7
LinuxHash
$6$OeKR9qBnzym.Q.VO$hM3uL03hmR4Z
qAME/8Ol.xWGYAmVdpi3S4hWGLeugaKN
j/HLzQPTz7FhjATYO/KXCNHZ8P7zJDi2
HHb1K.xfE.
FileEncryption
MSOffice
PDFs
Zip/7z/rar
TrueCrypt
Howdotheywork?
Knownfile-format/implementationweakness
Headerdatatoindicateencryption
Type,keylength,etc.
Oftensomesmallportiontodecrypt/validate
Howisitthatchangingencryptionkeysisfast?
Yourkeyencrypts“real”key
Isitreally
cracking?
PasswordGuessing
char string1[maxPassLength + 1];
char alphanum[63] =
"ABCDEFGHIJKLMNOPQRSTUVWXYZ"
"abcdefghijklmnopqrstuvwxyz"
"0123456789";
for 0 --> maxLength
for each char in alphanum…
SlightlyBetter...
int min = 8;
int max = 12;
char[] valid =
"ABCDEFGHIJKLMNOPQRSTUVWXYZ"
"abcdefghijklmnopqrstuvwxyz"
"0123456789";
// known rules
// first & last must be char
// no consecutive-ordered chars/nums
// no repeated chars/nums
DEMO:Crackinga
WindowsHash
WithoclHashCat
(more)IntelligentPassword
Guessing
Whatdopeopleusuallyuse?
Whatcanwedotoreducethesetofpossibilities?
Cullterms/domainknowledgefromrelevantdata
Datingsites,religioussites,others
Best:Alreadyused/real-worldpasswords
DetermineYourGoals
Crackingasingle,specificpwd?
Crackingalarge%ofan“acquiredset”?
MarkBurnett,authorofPerfectPasswords
Listof6,000,000,culleddownto10,000mostfrequentlyused
Top10,000passwordsrepresentby99.8%ofallpasswords
MorePasswordStats...
Overview
4.7%ofusershavethepasswordpassword
8.5%havethepasswordspasswordor123456
9.8%havethepasswordspassword,123456or12345678
14%haveapasswordfromthetop10passwords
40%haveapasswordfromthetop100passwords
79%haveapasswordfromthetop500passwords
91%haveapasswordfromthetop1000passwords
Fromauniquenessstandpoint...
99.6%oftheuniquepasswordsareusedbyonly0.18%of
users
https://xato.net/passwords/more-top-worst-passwords/
Lists....
PACK
PasswordAnalysisand
CrackingToolkit
PeterKacherginsky,
PasswordCon,
7/30-7/31
Intelligentcycleof
cracking,analysis,
rulegeneration
http://thesprawl.org/projects/pack/
StatisticalAnalysis
PasswordLengthAnalysis
CharacterSetAnalysis
WordManglingAnalysis
Example:Length
https://thesprawl.org/media/research/passwords13-smarter-password-cracking-with-pack.pdf
DEMO:Statistics
onRealPWs
AdvancedAnalytics
LevenshteinEditDistance
http://en.wikipedia.org/wiki/Levenshtein_distance
LevenshteinEditDistance
Minimumnumberofchangesrequiredto
changeonestringintoanother
Measuredistanceb/tactualwordsand
crackedlisttooptimizetheword
manglingrules
i.e.XX%ofwordscanbeachieved
withLevenshteineditdistanceof<=2
Onlygenrulesthatmatch
http://www.let.rug.nl/~kleiweg/lev/
http://www.kurzhals.info/static/samples/levenshtein_distance/
WhatifIdon'thaveyour
Password?
PasstheHash
ButWeuseSmartCards!?
AvoidanceTechniques
Don’tuse"monkey"
Don’treuse"monkey"
Ifyoumustuse"monkey",requiresomethingelseaswell
Saltisgood
Yourownsaltisbetter
Utilizememory-hardalgorithms
Utilizemultipleiterations(alot)
Yourusernameishalfoftheequation
References
http://haveibeenpwned.com/
https://lastpass.com/adobe/
https://lastpass.com/linkedin/
https://lastpass.com/lastfm/
https://shouldichangemypassword.com/all-sources.php
Questions/Contact
RobGillen
rob@gillenfamily.net
http://rob.gillenfamily.net
@argodev
Thistalkandrelatedresourcesareavailableonline:
https://github.com/argodev/talks/

Contenu connexe

Similaire à What's in a password

Internet of Things Brings On Development Demands That DevOps Manages, Say Exp...
Internet of Things Brings On Development Demands That DevOps Manages, Say Exp...Internet of Things Brings On Development Demands That DevOps Manages, Say Exp...
Internet of Things Brings On Development Demands That DevOps Manages, Say Exp...Dana Gardner
 
There's More to Open Source than Code
There's More to Open Source than CodeThere's More to Open Source than Code
There's More to Open Source than CodeRamnHuidobro
 
There's More to Open Source than Code
There's More to Open Source than CodeThere's More to Open Source than Code
There's More to Open Source than CodeRamnHuidobro
 
Building a reputation in IT
Building a reputation in ITBuilding a reputation in IT
Building a reputation in ITYitzikCasapu
 
Atmosphere Conference 2015: The 10 Myths of DevOps
Atmosphere Conference 2015: The 10 Myths of DevOpsAtmosphere Conference 2015: The 10 Myths of DevOps
Atmosphere Conference 2015: The 10 Myths of DevOpsPROIDEA
 
CCL AND TIPS FOR A GOOD PRESENTATION. 7up group.
CCL AND TIPS FOR A GOOD PRESENTATION. 7up group.CCL AND TIPS FOR A GOOD PRESENTATION. 7up group.
CCL AND TIPS FOR A GOOD PRESENTATION. 7up group.7UPSOYER
 
50 Shades of WordPress
50 Shades of WordPress50 Shades of WordPress
50 Shades of WordPressAndy Stratton
 
Continuous (Production) Integration: Ruby on Rails Application Monitoring wit...
Continuous (Production) Integration: Ruby on Rails Application Monitoring wit...Continuous (Production) Integration: Ruby on Rails Application Monitoring wit...
Continuous (Production) Integration: Ruby on Rails Application Monitoring wit...jnewland
 
A Mockery of a persentation
A Mockery of a persentationA Mockery of a persentation
A Mockery of a persentationGil Zilberfeld
 
[3DPrintShow Paris 2014] Impression 3D et Propriété Intellectuelle : Quels dé...
[3DPrintShow Paris 2014] Impression 3D et Propriété Intellectuelle : Quels dé...[3DPrintShow Paris 2014] Impression 3D et Propriété Intellectuelle : Quels dé...
[3DPrintShow Paris 2014] Impression 3D et Propriété Intellectuelle : Quels dé...Thierry Rayna
 
Remote Taiwan_Liv remote exp-as-a-pm-1214
Remote Taiwan_Liv remote exp-as-a-pm-1214Remote Taiwan_Liv remote exp-as-a-pm-1214
Remote Taiwan_Liv remote exp-as-a-pm-1214Andrew (ChunTzu) Yeh
 
Marketing: your allies in the fight for DevOps – full text (DevOps Days Minne...
Marketing: your allies in the fight for DevOps – full text (DevOps Days Minne...Marketing: your allies in the fight for DevOps – full text (DevOps Days Minne...
Marketing: your allies in the fight for DevOps – full text (DevOps Days Minne...Sarah Goff-Dupont
 
Connecting with the enterprise - The how and why of connecting to Enterprise ...
Connecting with the enterprise - The how and why of connecting to Enterprise ...Connecting with the enterprise - The how and why of connecting to Enterprise ...
Connecting with the enterprise - The how and why of connecting to Enterprise ...Kevin Poorman
 
Functional requirements: Thinking Like A Pirate
Functional requirements: Thinking Like A PirateFunctional requirements: Thinking Like A Pirate
Functional requirements: Thinking Like A PirateAmye Scavarda
 
Must have open source applications
Must have open source applicationsMust have open source applications
Must have open source applicationsBrianJamison
 
Planning JavaScript and Ajax for larger teams
Planning JavaScript and Ajax for larger teamsPlanning JavaScript and Ajax for larger teams
Planning JavaScript and Ajax for larger teamsChristian Heilmann
 
The journey to DevOps: What I learned after leading transformation at 2 Enter...
The journey to DevOps: What I learned after leading transformation at 2 Enter...The journey to DevOps: What I learned after leading transformation at 2 Enter...
The journey to DevOps: What I learned after leading transformation at 2 Enter...VMware Tanzu
 
Open Source Craft at Twitter
Open Source Craft at TwitterOpen Source Craft at Twitter
Open Source Craft at TwitterChris Aniszczyk
 
Industry stories on agile, scrum and kanban
Industry stories on agile, scrum and kanbanIndustry stories on agile, scrum and kanban
Industry stories on agile, scrum and kanbanBusiness901
 

Similaire à What's in a password (20)

Internet of Things Brings On Development Demands That DevOps Manages, Say Exp...
Internet of Things Brings On Development Demands That DevOps Manages, Say Exp...Internet of Things Brings On Development Demands That DevOps Manages, Say Exp...
Internet of Things Brings On Development Demands That DevOps Manages, Say Exp...
 
There's More to Open Source than Code
There's More to Open Source than CodeThere's More to Open Source than Code
There's More to Open Source than Code
 
There's More to Open Source than Code
There's More to Open Source than CodeThere's More to Open Source than Code
There's More to Open Source than Code
 
Building a reputation in IT
Building a reputation in ITBuilding a reputation in IT
Building a reputation in IT
 
Atmosphere Conference 2015: The 10 Myths of DevOps
Atmosphere Conference 2015: The 10 Myths of DevOpsAtmosphere Conference 2015: The 10 Myths of DevOps
Atmosphere Conference 2015: The 10 Myths of DevOps
 
CCL AND TIPS FOR A GOOD PRESENTATION. 7up group.
CCL AND TIPS FOR A GOOD PRESENTATION. 7up group.CCL AND TIPS FOR A GOOD PRESENTATION. 7up group.
CCL AND TIPS FOR A GOOD PRESENTATION. 7up group.
 
50 Shades of WordPress
50 Shades of WordPress50 Shades of WordPress
50 Shades of WordPress
 
Continuous (Production) Integration: Ruby on Rails Application Monitoring wit...
Continuous (Production) Integration: Ruby on Rails Application Monitoring wit...Continuous (Production) Integration: Ruby on Rails Application Monitoring wit...
Continuous (Production) Integration: Ruby on Rails Application Monitoring wit...
 
Types of Creative Commons Licenses
Types of Creative Commons LicensesTypes of Creative Commons Licenses
Types of Creative Commons Licenses
 
A Mockery of a persentation
A Mockery of a persentationA Mockery of a persentation
A Mockery of a persentation
 
[3DPrintShow Paris 2014] Impression 3D et Propriété Intellectuelle : Quels dé...
[3DPrintShow Paris 2014] Impression 3D et Propriété Intellectuelle : Quels dé...[3DPrintShow Paris 2014] Impression 3D et Propriété Intellectuelle : Quels dé...
[3DPrintShow Paris 2014] Impression 3D et Propriété Intellectuelle : Quels dé...
 
Remote Taiwan_Liv remote exp-as-a-pm-1214
Remote Taiwan_Liv remote exp-as-a-pm-1214Remote Taiwan_Liv remote exp-as-a-pm-1214
Remote Taiwan_Liv remote exp-as-a-pm-1214
 
Marketing: your allies in the fight for DevOps – full text (DevOps Days Minne...
Marketing: your allies in the fight for DevOps – full text (DevOps Days Minne...Marketing: your allies in the fight for DevOps – full text (DevOps Days Minne...
Marketing: your allies in the fight for DevOps – full text (DevOps Days Minne...
 
Connecting with the enterprise - The how and why of connecting to Enterprise ...
Connecting with the enterprise - The how and why of connecting to Enterprise ...Connecting with the enterprise - The how and why of connecting to Enterprise ...
Connecting with the enterprise - The how and why of connecting to Enterprise ...
 
Functional requirements: Thinking Like A Pirate
Functional requirements: Thinking Like A PirateFunctional requirements: Thinking Like A Pirate
Functional requirements: Thinking Like A Pirate
 
Must have open source applications
Must have open source applicationsMust have open source applications
Must have open source applications
 
Planning JavaScript and Ajax for larger teams
Planning JavaScript and Ajax for larger teamsPlanning JavaScript and Ajax for larger teams
Planning JavaScript and Ajax for larger teams
 
The journey to DevOps: What I learned after leading transformation at 2 Enter...
The journey to DevOps: What I learned after leading transformation at 2 Enter...The journey to DevOps: What I learned after leading transformation at 2 Enter...
The journey to DevOps: What I learned after leading transformation at 2 Enter...
 
Open Source Craft at Twitter
Open Source Craft at TwitterOpen Source Craft at Twitter
Open Source Craft at Twitter
 
Industry stories on agile, scrum and kanban
Industry stories on agile, scrum and kanbanIndustry stories on agile, scrum and kanban
Industry stories on agile, scrum and kanban
 

Plus de Rob Gillen

How well do you know your runtime
How well do you know your runtimeHow well do you know your runtime
How well do you know your runtimeRob Gillen
 
Software defined radio and the hacker
Software defined radio and the hackerSoftware defined radio and the hacker
Software defined radio and the hackerRob Gillen
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a passwordRob Gillen
 
Hiding in plain sight
Hiding in plain sightHiding in plain sight
Hiding in plain sightRob Gillen
 
ETCSS: Into the Mind of a Hacker
ETCSS: Into the Mind of a HackerETCSS: Into the Mind of a Hacker
ETCSS: Into the Mind of a HackerRob Gillen
 
DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?Rob Gillen
 
You think your WiFi is safe?
You think your WiFi is safe?You think your WiFi is safe?
You think your WiFi is safe?Rob Gillen
 
Anatomy of a Buffer Overflow Attack
Anatomy of a Buffer Overflow AttackAnatomy of a Buffer Overflow Attack
Anatomy of a Buffer Overflow AttackRob Gillen
 
Intro to GPGPU with CUDA (DevLink)
Intro to GPGPU with CUDA (DevLink)Intro to GPGPU with CUDA (DevLink)
Intro to GPGPU with CUDA (DevLink)Rob Gillen
 
A Comparison of AWS and Azure - Part2
A Comparison of AWS and Azure - Part2A Comparison of AWS and Azure - Part2
A Comparison of AWS and Azure - Part2Rob Gillen
 
A Comparison of AWS and Azure - Part 1
A Comparison of AWS and Azure - Part 1A Comparison of AWS and Azure - Part 1
A Comparison of AWS and Azure - Part 1Rob Gillen
 
Intro to GPGPU Programming with Cuda
Intro to GPGPU Programming with CudaIntro to GPGPU Programming with Cuda
Intro to GPGPU Programming with CudaRob Gillen
 
Scaling Document Clustering in the Cloud
Scaling Document Clustering in the CloudScaling Document Clustering in the Cloud
Scaling Document Clustering in the CloudRob Gillen
 
Hands On with Amazon Web Services (StirTrek)
Hands On with Amazon Web Services (StirTrek)Hands On with Amazon Web Services (StirTrek)
Hands On with Amazon Web Services (StirTrek)Rob Gillen
 
Windows Azure: Lessons From The Field
Windows Azure: Lessons From The FieldWindows Azure: Lessons From The Field
Windows Azure: Lessons From The FieldRob Gillen
 
Amazon Web Services for the .NET Developer
Amazon Web Services for the .NET DeveloperAmazon Web Services for the .NET Developer
Amazon Web Services for the .NET DeveloperRob Gillen
 
05561 Xfer Research 02
05561 Xfer Research 0205561 Xfer Research 02
05561 Xfer Research 02Rob Gillen
 
05561 Xfer Research 01
05561 Xfer Research 0105561 Xfer Research 01
05561 Xfer Research 01Rob Gillen
 
05561 Xfer Consumer 01
05561 Xfer Consumer 0105561 Xfer Consumer 01
05561 Xfer Consumer 01Rob Gillen
 

Plus de Rob Gillen (20)

How well do you know your runtime
How well do you know your runtimeHow well do you know your runtime
How well do you know your runtime
 
Software defined radio and the hacker
Software defined radio and the hackerSoftware defined radio and the hacker
Software defined radio and the hacker
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a password
 
Hiding in plain sight
Hiding in plain sightHiding in plain sight
Hiding in plain sight
 
ETCSS: Into the Mind of a Hacker
ETCSS: Into the Mind of a HackerETCSS: Into the Mind of a Hacker
ETCSS: Into the Mind of a Hacker
 
DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?
 
You think your WiFi is safe?
You think your WiFi is safe?You think your WiFi is safe?
You think your WiFi is safe?
 
Anatomy of a Buffer Overflow Attack
Anatomy of a Buffer Overflow AttackAnatomy of a Buffer Overflow Attack
Anatomy of a Buffer Overflow Attack
 
Intro to GPGPU with CUDA (DevLink)
Intro to GPGPU with CUDA (DevLink)Intro to GPGPU with CUDA (DevLink)
Intro to GPGPU with CUDA (DevLink)
 
AWS vs. Azure
AWS vs. AzureAWS vs. Azure
AWS vs. Azure
 
A Comparison of AWS and Azure - Part2
A Comparison of AWS and Azure - Part2A Comparison of AWS and Azure - Part2
A Comparison of AWS and Azure - Part2
 
A Comparison of AWS and Azure - Part 1
A Comparison of AWS and Azure - Part 1A Comparison of AWS and Azure - Part 1
A Comparison of AWS and Azure - Part 1
 
Intro to GPGPU Programming with Cuda
Intro to GPGPU Programming with CudaIntro to GPGPU Programming with Cuda
Intro to GPGPU Programming with Cuda
 
Scaling Document Clustering in the Cloud
Scaling Document Clustering in the CloudScaling Document Clustering in the Cloud
Scaling Document Clustering in the Cloud
 
Hands On with Amazon Web Services (StirTrek)
Hands On with Amazon Web Services (StirTrek)Hands On with Amazon Web Services (StirTrek)
Hands On with Amazon Web Services (StirTrek)
 
Windows Azure: Lessons From The Field
Windows Azure: Lessons From The FieldWindows Azure: Lessons From The Field
Windows Azure: Lessons From The Field
 
Amazon Web Services for the .NET Developer
Amazon Web Services for the .NET DeveloperAmazon Web Services for the .NET Developer
Amazon Web Services for the .NET Developer
 
05561 Xfer Research 02
05561 Xfer Research 0205561 Xfer Research 02
05561 Xfer Research 02
 
05561 Xfer Research 01
05561 Xfer Research 0105561 Xfer Research 01
05561 Xfer Research 01
 
05561 Xfer Consumer 01
05561 Xfer Consumer 0105561 Xfer Consumer 01
05561 Xfer Consumer 01
 

Dernier

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 

Dernier (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

What's in a password