hash   8439

« earlier    

Dumping Domain Password Hashes
There are various techniques that can be used to extract this file or the information that is stored inside it however the majority of them are using one of these methods:

Domain Controller Replication Services
Native Windows Binaries
hash  activedirectory  pentest 
2 days ago by whip_lash
Controlled experiments on the web: survey and practical guide
The web provides an unprecedented opportunity to evaluate ideas quickly using controlled experiments, also called randomized experiments, A/B tests (and their generalizations), split tests, Control/Treatment tests, MultiVariable Tests (MVT) and parallel flights. Controlled experiments embody the best scientific design for establishing a causal relationship between changes and their influence on user-observable behavior. We provide a practical guide to conducting online experiments, where endusers can help guide the development of features. Our experience indicates that significant learning and return-on-investment (ROI) are seen when development teams listen to their customers, not to the Highest Paid Person’s Opinion (HiPPO). We provide several examples of controlled experiments with surprising results. We review the important ingredients of running controlled experiments, and discuss their limitations (both technical and organizational). We focus on several areas that are critical to experimentation, including statistical power, sample size, and techniques for variance reduction. We describe common architectures for experimentation systems and analyze their advantages and disadvantages. We evaluate randomization and hashing techniques, which we show are not as simple in practice as is often assumed. Controlled experiments typically generate large amounts of data, which can be analyzed using data mining techniques to gain deeper understanding of the factors influencing the outcome of interest, leading to new hypotheses and creating a virtuous cycle of improvements. Organizations that embrace controlled experiments with clear evaluation criteria can evolve their systems with automated optimizations and real-time analyses. Based on our extensive practical experience with multiple systems and organizations, we share key lessons that will help practitioners in running trustworthy controlled experiments
ab-testing  hash  md5 
2 days ago by foodbaby
[1409.3174] Designing and Deploying Online Field Experiments
Online experiments are widely used to compare specific design alternatives, but they can also be used to produce generalizable knowledge and inform strategic decision making. Doing so often requires sophisticated experimental designs, iterative refinement, and careful logging and analysis. Few tools exist that support these needs. We thus introduce a language for online field experiments called PlanOut. PlanOut separates experimental design from application code, allowing the experimenter to concisely describe experimental designs, whether common "A/B tests" and factorial designs, or more complex designs involving conditional logic or multiple experimental units. These latter designs are often useful for understanding causal mechanisms involved in user behaviors. We demonstrate how experiments from the literature can be implemented in PlanOut, and describe two large field experiments conducted on Facebook with PlanOut. For common scenarios in which experiments are run iteratively and in parallel, we introduce a namespaced management system that encourages sound experimental practice.
ab-testing  facebook  hash 
2 days ago by foodbaby
Contribute to LinusU/rev-hash-cli development by creating an account on GitHub.
node.js  node  npm  javascript  hash  md5  bash  cli  linusu  rev-hash-cli 
3 days ago by moalex
arriqaaq/xring: An implementation of Consistent Hashing with Bounded Loads (using Red-Black tree)
An implementation of Consistent Hashing with Bounded Loads (using Red-Black tree) - arriqaaq/xring
golang  hash 
13 days ago by geetarista
An Intensive Introduction to Cryptography
These are lecture notes for lecture notes for an introductory but fast-paced undergraduate/beginning graduate course on cryptography. I am using these notes for Harvard CS 127.
cryptography  PRNG  PRF  Hash  functions  lattice  ZKP  Homomorphic  MPC  Quantum 
16 days ago by FredericJacobs

« earlier    

related tags

51%  80-minute  ab-testing  access  accessor  activedirectory  algo  algorithm  algorithms  and  android  ansible  antivirus  app  array  article  associative  attack  authorized  av  bad  balancing  bash  basics  blockchain  blog-material  bloomfilter  brotli  build  c#  cdn  certain  checksum  cli  cmdlet  code  coding  color  command  comparison  compressed  compression  compsci  computing  consistent  contentaddressing  cost  cracking  crypto-currencies  crypto  cryptography  cs  decrypt  design  developer  development  dht  dict  dictionary  diff  differences  diffing  dig  digitalsignature  docedotjs  documentation  dotnet  ds  editable  email  encoding  encrypt  engineer  example  exclude  executable  exercises  fabric  facebook  fallback  fibonacci  file  files  filter  fingerprint  firefly  flex  for  from  function  functions  funk  fuzzy  generation  generator  gesture  get  git  github  go  golang  golden-ratio  guide  hack  hacks  hash-function  hash-tables  hashcode  hashextension  hashing  hashmaps  homomorphic  howto  html  hyperledger  id  impacket  in  information  install  interview  intrustion  items  iterate  java  javascript  key  keypath  keys  lattice  ledger  linusu  list  load-distribution  loop  looping  loops  lzma  map  md5  md5sum  membership  memmap  memory  minaj  module  mpc  nc  netcat  network  nicki  node.js  node  npm  ntlm  open  openssl  out  outlook  overlay  p2p  password  paths  pbkdf2  pentest  performance  perl6  phone  piecewise  pip  playbook  portable  powershell  prf  prime  prng  programmer  programming  publishing  python  python2.7  qa  quantum  rails  random-md5-hash  readlater  reference  relay  repeat  repeatable  responder  rev-hash-cli  ruby  s1-fireflies  salt  scala  scalable  screen  screenshot  script  scripting  security  serverfault  sha  sha1  sha256  sharing  signature  simple  smb  snappy  software  spoof  sri  ssh  ssl  stackexchange  stackoverflow  store  strings  table  tamper  task  telnet  testing  their  tips  tolerant  toread  try  tutorial  type:article  url  values  web  webapp  webdev  webp  whitelist  wifi  windows  wpa  xml  yaml  zkp  算法 

Copy this bookmark: