Date: Mon, 27 Jun 2011 13:29:18 +0400 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: brute force attack of an Unix crypt Martin - On Mon, Jun 27, 2011 at 02:06:27AM +0300, Martin T wrote: > Checking the CPU usage of my 4-core Xeon X3220(4x 2.4GHz) processor, I > found out, that I had started an brute force attack at the beginning > of February(!). I had dedicated an entire CPU core for this process: Oh, if you deliberately only dedicated one CPU core for this, then please disregard my suggestion to use an OpenMP-enabled build. But do use a more optimal build otherwise - perhaps with the john-1.7.8-fast-des-key-setup-3.diff patch and using the linux-x86-64 make target. It will do around 2.7 million c/s on one CPU core, and it supports the Idle setting (unlike an OpenMP-enabled build). Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.