192 shaares
11 results
tagged
security
Those familiar with password cracking know that KoreLogic’s rule set for John the Ripper has become the de facto standard for password cracking. While updating the various rule sets is fine and dandy, but what about taking it a step further and rearranging the order in which they’re applied?
Most of the iptables traversal descriptions I have seen do not include
the mangle table, so it can be difficult to work out where to put
marks etc. This one includes the various mangle chains in the description
the mangle table, so it can be difficult to work out where to put
marks etc. This one includes the various mangle chains in the description