Evadland
  • Home
  • Blog

Passwords, Hashes and Dictionary Attacks

3/3/2011

0 Comments

 
Cryptology has been a favorite topic of research for me over the past 10 years. Ever since geometry class, I have been obsessed with mathematics, patterns, and number theory. I enjoy turning one value into a totally different value and back again. That may sound like nonsense, but that is exactly how cryptology (and thus password systems) work.

I am going to go into detail about one of the most popular password storage and verification processes in use on the internet, and in offline systems. This method is called a hash, specifically an MD5 hash. I will also outline 2 of the methods that hackers can use to compromise password.

Read More
0 Comments

Brother LB6800PRW & SE400 Sewing Machine 

1/22/2011

2 Comments

 
One of the things I needed to pick up for my new place was a sewing machine. Yes, I do some sewing every once and a while, such as some Adventure Time Finn hats, or a Ice King costume. Previously, I always borrowed some elses machine. Now that I have some room, I wanted to get my own.  Which did I decide on?  The Brother LB6800PRW.


Read More
2 Comments

Installing Linksys EG1032 V3 Gigabit Network card on Windows 7 x64 

8/15/2010

0 Comments

 
It figures that Linksys doesn't make a x64 driver for their EG1032 V3 gigabit card that I got many years ago. I kinda figured that Windows 7 would be able to find a driver for it anyway, but no such luck.

Read More
0 Comments

August 14th, 2010

8/14/2010

0 Comments

 
I wrote up something on a forum to give an idea of failure rates for different RAID array types, and it ended up being a pretty good summary.

Question: The storage guys seem to say to avoid RAID5 due to the huge storages sizes now and the high chance of errors during rebuilds

Read More
0 Comments

Garage storage

4/11/2010

0 Comments

 
For those of you that don't know, I bought a townhouse recently. Now, I can work on improving the house instead of responding to email.

I enjoy doing work with my hands when I have time; meaning woodworking, automotive, metalworking, building computers, anything really. Pretty much all of those require a good workspace. For me, that means the garage. So naturally, the first area I picked to upgrade was the garage.

Read More
0 Comments

a ramble on email

8/29/2009

0 Comments

 
Just how much of our current communication goes though a communication channel that is not face to face? This is a question I was thinking about today when I was asked about my email inbox status. How many of us take for granted our email? We can communicate with others on the other side of the earth in minutes instead of weeks for a paper letter.

Having said that, how many of us use email incorrectly? I know I do.

Read More
0 Comments

javascript and Numbers

7/10/2008

1 Comment

 
Today I was working on improving a javascript function that sorts an HTML table that I originally wrote about 5 years ago.

The problem that I have is that I am a novice in javascript. Well, novice is probably overestimating my capabilities in actuality. But anyway, I still needed to improve this function, and learn along the way.

Read More
1 Comment

Duplicate Images and MD5/SHA Hashes

6/18/2007

1 Comment

 
I was in the middle of backing up some family photos when I discovered that I had multiple copies of the same image in different folders. Not only is this a waste of space, but it can also lead to images getting deleted on accident when you believe you have a copy in another folder, but actually do not.

That begs the question, how in the world do you sort though thousands of photos making sure that you keep one, and only one copy of each? If you haven't renamed the files, you may be able to use the file name to weed though the duplicates, but what if you renamed some of the files, or have duplicate names on files? Now it starts getting a lot more complicated.

Read More
1 Comment

Microsoft Access Corruption

2/7/2003

0 Comments

 
I had a great question come up today on Microsoft Access Databases and corruption. Why does an access database become corrupted, how do you fix it, and how do you prevent the issue from happening in the future?

Read More
0 Comments

    Evadman

    Sometimes Witty, Always Informative

    Archives

    March 2011
    August 2010
    April 2010
    August 2009
    July 2008
    June 2007
    February 2003

    Categories

    All

    RSS Feed