Code Monkey home page Code Monkey logo

Comments (2)

mfthomps avatar mfthomps commented on June 10, 2024

The question has been reworded to read:
13. Item #12 recorded the time it took to perform a dictionary attack on a file of MD5 digests. Assume there is a hash algorithm called APR1 that is simply 1000 iterations of MD5. If this password file indicated that APR1 had been used instead of MD5, approximately how many seconds would it have taken? Show your work.

Running "update-labtainer.sh' from the labtainer-student directory will get the newer version -- but will not overwrite report templates modified by students.
Thank you for the report.

from labtainers.

nikifor avatar nikifor commented on June 10, 2024

Great, thank you!

from labtainers.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.