j john-1.7.3.1.tar.gz By packetstormsecurity.com Published On :: Sat, 19 Jul 2008 00:43:09 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well. Full Article
j John The Ripper 1.7.3.4 By packetstormsecurity.com Published On :: Mon, 21 Sep 2009 17:26:16 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well. Full Article
j John The Ripper 1.7.4 By packetstormsecurity.com Published On :: Wed, 30 Dec 2009 06:00:36 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well. Full Article
j john-1.7.4.2.tar.gz By packetstormsecurity.com Published On :: Thu, 04 Feb 2010 04:33:25 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well. Full Article
j John The Ripper 1.7.5 By packetstormsecurity.com Published On :: Fri, 26 Feb 2010 19:07:15 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well. Full Article
j John The Ripper 1.7.6 By packetstormsecurity.com Published On :: Wed, 16 Jun 2010 01:48:44 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
j John The Ripper 1.7.6 Jumbo 11 By packetstormsecurity.com Published On :: Tue, 08 Feb 2011 04:49:46 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version. Full Article
j John The Ripper 1.7.6 Jumbo 12 By packetstormsecurity.com Published On :: Wed, 16 Feb 2011 19:22:11 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version. Full Article
j John The Ripper 1.7.7 By packetstormsecurity.com Published On :: Thu, 28 Apr 2011 12:12:12 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version. Full Article
j John The Ripper 1.7.7 By packetstormsecurity.com Published On :: Fri, 29 Apr 2011 03:51:02 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version. Full Article
j John The Ripper 1.7.7 Jumbo 5 By packetstormsecurity.com Published On :: Fri, 03 Jun 2011 20:22:22 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version. Full Article
j John The Ripper 1.7.7 Jumbo 6 By packetstormsecurity.com Published On :: Thu, 09 Jun 2011 15:46:26 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version. Full Article
j John The Ripper 1.7.8 By packetstormsecurity.com Published On :: Fri, 24 Jun 2011 09:05:49 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
j John The Ripper 1.7.8 Jumbo 2 By packetstormsecurity.com Published On :: Tue, 05 Jul 2011 00:27:53 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
j John The Ripper 1.7.8 Jumbo 4 By packetstormsecurity.com Published On :: Sun, 24 Jul 2011 15:32:20 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
j John The Ripper 1.7.8 Jumbo 5 By packetstormsecurity.com Published On :: Thu, 04 Aug 2011 00:04:00 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
j John The Ripper 1.7.8 Jumbo 7 By packetstormsecurity.com Published On :: Thu, 22 Sep 2011 05:56:59 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
j John The Ripper 1.7.8 Jumbo 8 By packetstormsecurity.com Published On :: Thu, 10 Nov 2011 02:42:41 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
j John The Ripper 1.7.9 By packetstormsecurity.com Published On :: Sun, 27 Nov 2011 18:09:38 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
j John The Ripper 1.7.9 Jumbo 5 By packetstormsecurity.com Published On :: Mon, 19 Dec 2011 02:25:02 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
j John The Ripper 1.7.9 Jumbo 6 By packetstormsecurity.com Published On :: Mon, 02 Jul 2012 23:53:25 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
j John The Ripper 1.7.9 Jumbo 7 By packetstormsecurity.com Published On :: Sat, 22 Sep 2012 06:17:27 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
j John The Ripper 1.8.0 By packetstormsecurity.com Published On :: Fri, 31 May 2013 02:49:42 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
j Opera Just Added A Bitcoin-Mining Blocker By packetstormsecurity.com Published On :: Fri, 22 Dec 2017 16:12:26 GMT Full Article headline opera
j Jenny.htm By packetstormsecurity.com Published On :: Tue, 11 Jan 2005 07:29:33 GMT Results from a national wardial against Jenny 867-5309. This is hilarious. Full Article
j Jury Scrutinizes DMCA in ElcomSoft Case By packetstormsecurity.com Published On :: Mon, 16 Dec 2002 04:01:13 GMT Full Article government dmca
j Jury Convicts DirecTV Pirate On DMCA Charges By packetstormsecurity.com Published On :: Tue, 23 Sep 2003 14:42:48 GMT Full Article government dmca
j Apple Files Opposition To DMCA Exemption For Jailbreaking By packetstormsecurity.com Published On :: Fri, 13 Feb 2009 12:00:58 GMT Full Article phone dmca apple
j US Rules Jailbreaking Tablets Is Illegal By packetstormsecurity.com Published On :: Fri, 26 Oct 2012 15:10:43 GMT Full Article headline government usa flaw dmca apple samsung
j Jamming Systems Play Secret Role In Iraq By packetstormsecurity.com Published On :: Mon, 13 Aug 2007 10:26:34 GMT Full Article iraq
j Variety Jones, Alleged Silk Road Mentor, Arrested In Thailand By packetstormsecurity.com Published On :: Mon, 07 Dec 2015 15:02:54 GMT Full Article headline thailand
j Windows NT/2K/XP/2K3/VISTA/2K8/7/8 EPATHOBJ Local ring0 By packetstormsecurity.com Published On :: Mon, 03 Jun 2013 16:28:24 GMT There is a pretty obvious bug in win32k!EPATHOBJ::pprFlattenRec where the PATHREC object returned by win32k!EPATHOBJ::newpathrec does not initialize the next list pointer. This is a local ring0 exploit for Microsoft Windows NT/2K/XP/2K3/VISTA/2K8/7/8. Full Article
j Siemens Tidal Energy Project Suspended By feedproxy.google.com Published On :: 2014-09-11T16:31:00Z Marine Current Turbines (MCT), the tidal energy company owned by German engineering giant Siemens has announced that it has suspended development of a planned 10 MW tidal array in Wales. Full Article Baseload Hydropower
j Scotland Rejects Independence, But Concerns Linger for a Renewables Future By feedproxy.google.com Published On :: 2014-09-26T05:01:00Z Scotland’s decision to vote no to independence from the United Kingdom of Great Britain and Northern Ireland has elicited a collective sigh of relief from energy sector players. Those companies with significant investments in Scottish renewable energy assets had understandably been anxious over the uncertainty that an independent Scotland would engender, for example potentially changing the rules on support measures for renewable energy investment north of the border. Full Article Energy Efficiency Hydropower Baseload Storage Energy Efficiency Bioenergy Policy Wind Power Solar Geothermal
j Japan Installs 11 GW of Renewable Energy in Two Years By feedproxy.google.com Published On :: 2014-09-29T14:40:00Z Japan has added 11,090 megawatts of clean energy capacity since July 2012, when it began an incentive program to encourage investment in renewables, according to the Ministry of Economy, Trade and Industry. Full Article Storage Wind Power Solar
j Increased Study Requirements, Loss of DOE Backing End Admiralty Inlet Tidal Pilot Project By feedproxy.google.com Published On :: 2014-10-13T15:03:00Z Snohomish County Public Utility District announced it is abandoning plans to develop the 600-kW Admiralty Inlet Pilot tidal project in Washington's Puget Sound. Full Article Monitoring Policy Hydropower Baseload
j Japan Should Continue Its Road Towards Renewables By feedproxy.google.com Published On :: 2014-12-01T14:10:00Z The power sector crisis in Japan has entered a new stage. The recent refusal of Japanese utilities to grant grid access to new renewable energy projects should not be seen as a failure of Japan’s renewable energy policy, but as a consequential and necessary phase to extend Japan’s technological leadership into the power sector. Full Article Energy Efficiency Hydropower Storage Bioenergy Policy Wind Power Baseload Energy Efficiency Rooftop Opinion & Commentary Solar Geothermal
j German Fossil Fuel Giant Jumps on Renewables Bandwagon By feedproxy.google.com Published On :: 2014-12-03T06:01:00Z Germany’s biggest utility E.ON — long a pillar of the country’s fossil fuel and nuclear industry — dropped a bombshell on Europe’s business world with the announcement that the multinational was exiting the conventional energy market in favor of a new business model based on renewables, intelligent grid systems, energy management and other services. Indeed, the company seems finally to have drawn the logical consequences from the Energiewende, Germany’s renewable energy transition, after years of resisting the ambitious transformation of the nation’s energy supply. Full Article Energy Efficiency Hydropower Baseload Storage Energy Efficiency Bioenergy Policy Wind Power Solar Geothermal
j Japan's Prime Minister Re-Election Risks Undercutting Clean Energy Push By feedproxy.google.com Published On :: 2014-12-16T16:06:00Z Shinzo Abe’s re-election as prime minister risks undercutting Japan’s commitment to clean energy at a time when incentives are under review and the nation’s utilities say they can’t accommodate capacity already planned. Full Article Storage Energy Efficiency Wind Power Solar
j Japan Toughens Rules for Renewable Energy Incentive Payments By feedproxy.google.com Published On :: 2014-12-18T17:53:00Z Japan’s trade ministry is setting stricter rules for production and sales of renewable energy in what it says is a drive to speed up development of projects and ensure stable power supply. Full Article Storage Energy Efficiency Wind Power Solar
j Solar Tariffs: Throttling America's Biggest Job Creation Machine By feedproxy.google.com Published On :: 2014-12-18T18:00:00Z The U.S. Department of Commerce just announced that it will add high tariffs for solar modules imported from China. The Canadian government is also investigating the adoption of similar measures, following recent complaints filed by Ontario-based solar manufacturers. With the solar industry in hypergrowth, it’s not a surprise that these governments are interested in boosting new jobs, protecting their economies, and fostering the solar sector. The problem is that tariffs are a short-sighted approach that actually attack the future of North American solar on its home soil, and likely destroy more jobs than they create. Full Article Energy Efficiency Hydropower Baseload Storage Energy Efficiency Bioenergy Wind Power Opinion & Commentary Solar Geothermal
j Busting the Myth of “Job-Killing EPA Regulations” By feedproxy.google.com Published On :: 2014-12-23T13:28:00Z Earlier this month, when EPA proposed a new health-protective air quality standard for the pollutants that form “ozone,” some critics predictably pounced on it as another example of a long string of “job-killing EPA regulations.” Yet last week, we learned that the U.S. economy created about 320,000 new jobs in November, and average wages are starting to rise as the labor market tightens. Full Article Energy Efficiency Hydropower Baseload Storage Energy Efficiency Bioenergy Policy Wind Power Opinion & Commentary Solar Geothermal
j Fact Sheet: Renewable Energy Job Numbers By feedproxy.google.com Published On :: 2015-01-07T13:00:00Z A 2013 report from the Bureau of Labor Statistics (BLS) found 3.4 million green jobs in the United States at the end of 2011. This is the latest data available from BLS, due to the elimination of its Green Careers program. On March 1, 2013, the across-the board spending cuts referred to as sequestration, required by the amended Balanced Budget and Emergency Deficit Control Act, came into effect. As part of those budget cuts, BLS stopped offering all “measuring green jobs” products. Full Article Energy Efficiency Hydropower Baseload Storage Energy Efficiency Bioenergy Wind Power Solar Geothermal
j Brazilian Bank Raises $408 Million for Renewable Energy and Water Projects By feedproxy.google.com Published On :: 2015-01-27T18:23:00Z The Brazilian bank Itau Unibanco Holding SA raised 1.05 billion reais ($408 million) to finance renewable energy and water treatment projects. Full Article Storage Energy Efficiency Wind Power Solar
j California's Clean Tech Industry Best in US for Jobs and Investment By feedproxy.google.com Published On :: 2015-02-03T17:57:00Z California’s bet on green energy is paying off, with clean technology companies creating more jobs and investing more money than competitors in any other state. Full Article Storage Energy Efficiency Wind Power Solar
j Broad Coalition Coalesces for Clean Energy Jobs in Illinois By feedproxy.google.com Published On :: 2015-02-06T12:42:00Z Labor, business, and environmental leaders have formed a unique coalition that will urge Illinois lawmakers to pass new standards for energy efficiency and renewable energy, leading to tens of thousands of new, local jobs. Full Article Hydropower Baseload Storage Bioenergy Policy Wind Power Opinion & Commentary Solar Geothermal
j Former FERC Chief Jon Wellinghoff Speaks Out on Grid Security and Distributed Generation By feedproxy.google.com Published On :: 2015-02-09T12:07:00Z In a previous article, I had a conversation with former-CIA chief Jim Woolsey to discuss one of America’s greatest national security vulnerabilities, its power grid. The issues that Woolsey has been concerned with for over a decade has been the ease in which a terrorist group or other actor (think North Korea for example) could attack the grid and plunge the country into darkness for months, if not years. And if that seems far-fetched, just recall how a tree limb fell in Ohio in 2003 and blacked out the entire Northeast and part of Canada for several days. Full Article Energy Efficiency Hydropower Baseload Storage Energy Efficiency Bioenergy Policy Wind Power Solar Geothermal Asset Management
j Clean Energy Is Just Smart Business for Leaders like Apple and Google By feedproxy.google.com Published On :: 2015-02-25T16:07:00Z Apple and Google have changed our lives forever, both because of their technological innovations and sheer size as global corporations. Now, they’re aiming to reshape the energy landscape. Full Article Energy Efficiency Hydropower Baseload Storage Energy Efficiency Bioenergy Wind Power Opinion & Commentary Solar Project Development Geothermal
j Beijing to Shut All Major Coal Power Plants to Cut Pollution By feedproxy.google.com Published On :: 2015-03-24T15:57:00Z Beijing, where pollution averaged more than twice China’s national standard last year, will close the last of its four major coal-fired power plants next year. Full Article Storage Energy Efficiency Wind Power Solar
j Fossil Fuels Just Lost the Race Against Renewables By feedproxy.google.com Published On :: 2015-04-15T15:53:00Z The race for renewable energy has passed a turning point. The world is now adding more capacity for renewable power each year than coal, natural gas, and oil combined. And there's no going back. Full Article Energy Efficiency Hydropower Baseload Storage Energy Efficiency Bioenergy Wind Power Solar Geothermal