<article>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#article09_12_07_2322235</id>
	<title>WPA-PSK Cracking As a Service</title>
	<author>kdawson</author>
	<datestamp>1260189060000</datestamp>
	<htmltext>An anonymous reader writes <i>"<a href="http://www.thoughtcrime.org/">Moxie Marlinspike</a>, a security researcher well known for his <a href="//it.slashdot.org/story/09/08/04/1254204/Null-Prefix-SSL-Attacks-Enabled-In-New-sslsniff">SSL/TLS attacks</a>, today launched a <a href="http://www.pcworld.com/businesscenter/article/183934/new\_cloudbased\_service\_steals\_wifi\_passwords.html">cloud-based WPA cracking service</a>, where for $34 you can test the security of your WPA password. The <a href="http://www.wpacracker.com/">WPA Cracker Web site</a> states: 'WPA-PSK networks are vulnerable to dictionary attacks, but running a respectable-sized dictionary over a WPA network handshake can take days or weeks. WPA Cracker gives you access to a 400CPU cluster that will run your network capture against a 135 million word dictionary created specifically for WPA passwords. While this job would take over 5 days on a contemporary dual-core PC, on our cluster it takes an average of 20 minutes.'"</i></htmltext>
<tokenext>An anonymous reader writes " Moxie Marlinspike , a security researcher well known for his SSL/TLS attacks , today launched a cloud-based WPA cracking service , where for $ 34 you can test the security of your WPA password .
The WPA Cracker Web site states : 'WPA-PSK networks are vulnerable to dictionary attacks , but running a respectable-sized dictionary over a WPA network handshake can take days or weeks .
WPA Cracker gives you access to a 400CPU cluster that will run your network capture against a 135 million word dictionary created specifically for WPA passwords .
While this job would take over 5 days on a contemporary dual-core PC , on our cluster it takes an average of 20 minutes .
' "</tokentext>
<sentencetext>An anonymous reader writes "Moxie Marlinspike, a security researcher well known for his SSL/TLS attacks, today launched a cloud-based WPA cracking service, where for $34 you can test the security of your WPA password.
The WPA Cracker Web site states: 'WPA-PSK networks are vulnerable to dictionary attacks, but running a respectable-sized dictionary over a WPA network handshake can take days or weeks.
WPA Cracker gives you access to a 400CPU cluster that will run your network capture against a 135 million word dictionary created specifically for WPA passwords.
While this job would take over 5 days on a contemporary dual-core PC, on our cluster it takes an average of 20 minutes.
'"</sentencetext>
</article>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360458</id>
	<title>Good thing</title>
	<author>Anonymous</author>
	<datestamp>1260197160000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Good thing "yourmomispoo" isn't in the diction. Phew!</p></htmltext>
<tokenext>Good thing " yourmomispoo " is n't in the diction .
Phew !</tokentext>
<sentencetext>Good thing "yourmomispoo" isn't in the diction.
Phew!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361460</id>
	<title>Re:One problem</title>
	<author>Anonymous</author>
	<datestamp>1260204960000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Wow... ya think? I'm pretty sure you can use it to crack other passwords toooooooooooooo.</p></htmltext>
<tokenext>Wow... ya think ?
I 'm pretty sure you can use it to crack other passwords toooooooooooooo .</tokentext>
<sentencetext>Wow... ya think?
I'm pretty sure you can use it to crack other passwords toooooooooooooo.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360426</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360470</id>
	<title>$34 you can test the security of your WPA password</title>
	<author>Anonymous</author>
	<datestamp>1260197220000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>1</modscore>
	<htmltext><p>Only an idiot would pay $34 to see if their password was '12345'.</p><p>You can get a nice entropic <a href="https://www.grc.com/passwords.htm" title="grc.com" rel="nofollow">password for free.</a> [grc.com]</p></htmltext>
<tokenext>Only an idiot would pay $ 34 to see if their password was '12345'.You can get a nice entropic password for free .
[ grc.com ]</tokentext>
<sentencetext>Only an idiot would pay $34 to see if their password was '12345'.You can get a nice entropic password for free.
[grc.com]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360448</id>
	<title>"test your key", riiiiight</title>
	<author>SuperBanana</author>
	<datestamp>1260197100000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p> <i> While this job would take over 5 days on a contemporary dual-core PC, on our cluster it takes an average of 20 minutes</i>

</p><p>Anyone interested in testing their own key would not care about it taking 5 days.  During a weekday, you're not around most of the time anyway.  I doubt anyone cares enough to spend $40 for something that can be done for free.</p></htmltext>
<tokenext>While this job would take over 5 days on a contemporary dual-core PC , on our cluster it takes an average of 20 minutes Anyone interested in testing their own key would not care about it taking 5 days .
During a weekday , you 're not around most of the time anyway .
I doubt anyone cares enough to spend $ 40 for something that can be done for free .</tokentext>
<sentencetext>  While this job would take over 5 days on a contemporary dual-core PC, on our cluster it takes an average of 20 minutes

Anyone interested in testing their own key would not care about it taking 5 days.
During a weekday, you're not around most of the time anyway.
I doubt anyone cares enough to spend $40 for something that can be done for free.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30363846</id>
	<title>Brilliant business plan</title>
	<author>(arg!)Styopa</author>
	<datestamp>1260278820000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Capitalism-wise, it's genius.  Nearly as smart as prostitution.</p><p>"Let me perform a service, charging you by the hour, but the longer I go the happier you are."</p></htmltext>
<tokenext>Capitalism-wise , it 's genius .
Nearly as smart as prostitution .
" Let me perform a service , charging you by the hour , but the longer I go the happier you are .
"</tokentext>
<sentencetext>Capitalism-wise, it's genius.
Nearly as smart as prostitution.
"Let me perform a service, charging you by the hour, but the longer I go the happier you are.
"</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30370192</id>
	<title>Re:Passwords that are found in dictionaries = FAIL</title>
	<author>qmaqdk</author>
	<datestamp>1260266340000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>3. If you can, use public key authentication. Let&rsquo;s see them brute-force a 2048 bit key!</p></div><p>Remember that you can't compare symmetric and asymmetric schemes like that. Usually, in symmetric schemes the bits refer to the length of the password, where in asymmetric schemes it refers to the size of the prime numbers involved. For instance it took a good amount of time to break 64-bit DES at distributed.net, but a 663 bit prime number has been factorized using a general purpose algorithm (http://en.wikipedia.org/wiki/RSA#Integer\_factorization\_and\_RSA\_problem).</p></div>
	</htmltext>
<tokenext>3 .
If you can , use public key authentication .
Let    s see them brute-force a 2048 bit key ! Remember that you ca n't compare symmetric and asymmetric schemes like that .
Usually , in symmetric schemes the bits refer to the length of the password , where in asymmetric schemes it refers to the size of the prime numbers involved .
For instance it took a good amount of time to break 64-bit DES at distributed.net , but a 663 bit prime number has been factorized using a general purpose algorithm ( http : //en.wikipedia.org/wiki/RSA # Integer \ _factorization \ _and \ _RSA \ _problem ) .</tokentext>
<sentencetext>3.
If you can, use public key authentication.
Let’s see them brute-force a 2048 bit key!Remember that you can't compare symmetric and asymmetric schemes like that.
Usually, in symmetric schemes the bits refer to the length of the password, where in asymmetric schemes it refers to the size of the prime numbers involved.
For instance it took a good amount of time to break 64-bit DES at distributed.net, but a 663 bit prime number has been factorized using a general purpose algorithm (http://en.wikipedia.org/wiki/RSA#Integer\_factorization\_and\_RSA\_problem).
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360996</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360460</id>
	<title>Well at least you can say Moxie has Moxie.</title>
	<author>Anonymous</author>
	<datestamp>1260197160000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext>$34 to see if your password can survive a dictionary attack?  Hell pay me $20 and I'll gladly save you some money and provide you with a password guaranteed to be unbreakable by brute force.  I'll even sign an NDA to ensure I don't disclose it to anyone but rest assured even I won't be able to remember it!</htmltext>
<tokenext>$ 34 to see if your password can survive a dictionary attack ?
Hell pay me $ 20 and I 'll gladly save you some money and provide you with a password guaranteed to be unbreakable by brute force .
I 'll even sign an NDA to ensure I do n't disclose it to anyone but rest assured even I wo n't be able to remember it !</tokentext>
<sentencetext>$34 to see if your password can survive a dictionary attack?
Hell pay me $20 and I'll gladly save you some money and provide you with a password guaranteed to be unbreakable by brute force.
I'll even sign an NDA to ensure I don't disclose it to anyone but rest assured even I won't be able to remember it!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30362762</id>
	<title>Re:400 CPU cluster or 400 node botnet?</title>
	<author>wagnerrp</author>
	<datestamp>1260263280000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>The cost of $34 is exactly a 50\% markup of 400 of Amazon's 'medium high-cpu' instances for the quoted 20 minutes.</htmltext>
<tokenext>The cost of $ 34 is exactly a 50 \ % markup of 400 of Amazon 's 'medium high-cpu ' instances for the quoted 20 minutes .</tokentext>
<sentencetext>The cost of $34 is exactly a 50\% markup of 400 of Amazon's 'medium high-cpu' instances for the quoted 20 minutes.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360652</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360878</id>
	<title>Re:And Slashdot is promoting this</title>
	<author>Nerdfest</author>
	<datestamp>1260200100000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Because Moxie Marlinspike is the coolest name ever, with the possible exception of Neal Anderthal.</htmltext>
<tokenext>Because Moxie Marlinspike is the coolest name ever , with the possible exception of Neal Anderthal .</tokentext>
<sentencetext>Because Moxie Marlinspike is the coolest name ever, with the possible exception of Neal Anderthal.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360436</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360864</id>
	<title>Re:400 CPU cluster or 400 node botnet?</title>
	<author>maxume</author>
	<datestamp>1260199980000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>They (only) accept Amazon payments, so it wouldn't be terribly shocking if they were using EC2.</p><p>They even offer high cpu instances:</p><p><a href="http://aws.amazon.com/ec2/instance-types/" title="amazon.com" rel="nofollow">http://aws.amazon.com/ec2/instance-types/</a> [amazon.com]</p><p>Given that they only charge $0.68 per hour for the high performance instances, he can buy quite a lot of horsepower for $17, and the costs of doing it twice as fast are pretty much exactly the same.</p></htmltext>
<tokenext>They ( only ) accept Amazon payments , so it would n't be terribly shocking if they were using EC2.They even offer high cpu instances : http : //aws.amazon.com/ec2/instance-types/ [ amazon.com ] Given that they only charge $ 0.68 per hour for the high performance instances , he can buy quite a lot of horsepower for $ 17 , and the costs of doing it twice as fast are pretty much exactly the same .</tokentext>
<sentencetext>They (only) accept Amazon payments, so it wouldn't be terribly shocking if they were using EC2.They even offer high cpu instances:http://aws.amazon.com/ec2/instance-types/ [amazon.com]Given that they only charge $0.68 per hour for the high performance instances, he can buy quite a lot of horsepower for $17, and the costs of doing it twice as fast are pretty much exactly the same.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360652</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30377768</id>
	<title>Re:Build a dictionary!</title>
	<author>Anonymous</author>
	<datestamp>1259601420000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>reminds me of this: http://www.bash.org/?244321</p></htmltext>
<tokenext>reminds me of this : http : //www.bash.org/ ? 244321</tokentext>
<sentencetext>reminds me of this: http://www.bash.org/?244321</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361470</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30365092</id>
	<title>Re:Which is why...</title>
	<author>L4t3r4lu5</author>
	<datestamp>1260287160000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>That password would be vulnerable to a standard dictionary attack which included l33t v@r1a7i0nZ.<br> <br>Interleaving words makes it mmuocrhe htaord bfrourtcee.<br> <br>(much more hard to brute force)</htmltext>
<tokenext>That password would be vulnerable to a standard dictionary attack which included l33t v @ r1a7i0nZ .
Interleaving words makes it mmuocrhe htaord bfrourtcee .
( much more hard to brute force )</tokentext>
<sentencetext>That password would be vulnerable to a standard dictionary attack which included l33t v@r1a7i0nZ.
Interleaving words makes it mmuocrhe htaord bfrourtcee.
(much more hard to brute force)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360464</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361692</id>
	<title>Re:400 CPU cluster or 400 node botnet?</title>
	<author>Dan541</author>
	<datestamp>1260207060000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Amazon EC2?</p></htmltext>
<tokenext>Amazon EC2 ?</tokentext>
<sentencetext>Amazon EC2?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360652</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360358</id>
	<title>One problem</title>
	<author>Logic Worshipper</author>
	<datestamp>1260196440000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Most people try to crack WiFi because they don't have internet, in which case it would impossible to access a cluster.  It would be cool if it got you internet anywhere there was wifi, but it won't work, because you can't log into the cluster without internet anyway, so what's the point?  Besides stealing data of course.</p></htmltext>
<tokenext>Most people try to crack WiFi because they do n't have internet , in which case it would impossible to access a cluster .
It would be cool if it got you internet anywhere there was wifi , but it wo n't work , because you ca n't log into the cluster without internet anyway , so what 's the point ?
Besides stealing data of course .</tokentext>
<sentencetext>Most people try to crack WiFi because they don't have internet, in which case it would impossible to access a cluster.
It would be cool if it got you internet anywhere there was wifi, but it won't work, because you can't log into the cluster without internet anyway, so what's the point?
Besides stealing data of course.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30366390</id>
	<title>Re:400 CPU cluster or 400 node botnet?</title>
	<author>Anonymous</author>
	<datestamp>1260292560000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>how can he run 4-5 jobs an hour when 1 job takes 20 minutes???</p></htmltext>
<tokenext>how can he run 4-5 jobs an hour when 1 job takes 20 minutes ? ?
?</tokentext>
<sentencetext>how can he run 4-5 jobs an hour when 1 job takes 20 minutes??
?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360802</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361682</id>
	<title>Re:Build a dictionary!</title>
	<author>Anonymous</author>
	<datestamp>1260206940000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>No no no no, when you submit your password it will only appear as ***** to them.</p></div><p>they'll think everyone's password is hunter2?</p></div>
	</htmltext>
<tokenext>No no no no , when you submit your password it will only appear as * * * * * to them.they 'll think everyone 's password is hunter2 ?</tokentext>
<sentencetext>No no no no, when you submit your password it will only appear as ***** to them.they'll think everyone's password is hunter2?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361470</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360816</id>
	<title>$34?  I can undercut that.</title>
	<author>smchris</author>
	<datestamp>1260199620000</datestamp>
	<modclass>Funny</modclass>
	<modscore>3</modscore>
	<htmltext><p>For $30 I'll run the command-line random number generator I found on the web and send you a 60 digit number.</p><p>If you act today, that's only 50 cents a number!</p></htmltext>
<tokenext>For $ 30 I 'll run the command-line random number generator I found on the web and send you a 60 digit number.If you act today , that 's only 50 cents a number !</tokentext>
<sentencetext>For $30 I'll run the command-line random number generator I found on the web and send you a 60 digit number.If you act today, that's only 50 cents a number!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30362690</id>
	<title>Mine cannot be cracked</title>
	<author>Anonymous</author>
	<datestamp>1260305400000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>This service cannot crack my WPA password. Because my password doesn't exsist in a nerds dictionary: "women"</htmltext>
<tokenext>This service can not crack my WPA password .
Because my password does n't exsist in a nerds dictionary : " women "</tokentext>
<sentencetext>This service cannot crack my WPA password.
Because my password doesn't exsist in a nerds dictionary: "women"</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360798</id>
	<title>Do you trust moxie?</title>
	<author>Anonymous</author>
	<datestamp>1260199500000</datestamp>
	<modclass>Funny</modclass>
	<modscore>1</modscore>
	<htmltext><p>Given his infamous reputation for exploiting SSL, do you trust moxie?</p><p>What happens if he says your passphrase survived the 20 minute test dictionary run, you put it in production, and he leaves the system running and breaks it later in a brute force attack?  Would they tell you that it was cracked then?</p></htmltext>
<tokenext>Given his infamous reputation for exploiting SSL , do you trust moxie ? What happens if he says your passphrase survived the 20 minute test dictionary run , you put it in production , and he leaves the system running and breaks it later in a brute force attack ?
Would they tell you that it was cracked then ?</tokentext>
<sentencetext>Given his infamous reputation for exploiting SSL, do you trust moxie?What happens if he says your passphrase survived the 20 minute test dictionary run, you put it in production, and he leaves the system running and breaks it later in a brute force attack?
Would they tell you that it was cracked then?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361202</id>
	<title>Use a passhprase</title>
	<author>WD</author>
	<datestamp>1260203100000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>e.g. a sentence.  With capitalization and punctuation.   You won't really have to worry about dictionary attacks that way.</p></htmltext>
<tokenext>e.g .
a sentence .
With capitalization and punctuation .
You wo n't really have to worry about dictionary attacks that way .</tokentext>
<sentencetext>e.g.
a sentence.
With capitalization and punctuation.
You won't really have to worry about dictionary attacks that way.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360586</id>
	<title>Re:One problem</title>
	<author>fake\_name</author>
	<datestamp>1260198000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Just wait for the iPhone app, so you can use your mobile connection to break into the faster wifi broadband.</p></htmltext>
<tokenext>Just wait for the iPhone app , so you can use your mobile connection to break into the faster wifi broadband .</tokentext>
<sentencetext>Just wait for the iPhone app, so you can use your mobile connection to break into the faster wifi broadband.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360358</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361856</id>
	<title>Nice name</title>
	<author>Frogbert</author>
	<datestamp>1260209040000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Moxie Marlinspike. That's a Gnome name if ever I heard one.</p></htmltext>
<tokenext>Moxie Marlinspike .
That 's a Gnome name if ever I heard one .</tokentext>
<sentencetext>Moxie Marlinspike.
That's a Gnome name if ever I heard one.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360652</id>
	<title>400 CPU cluster or 400 node botnet?</title>
	<author>motherjoe</author>
	<datestamp>1260198480000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>"WPA Cracker gives you access to a 400CPU cluster that will run your network capture against a 135 million word dictionary created specifically for WPA passwords"</p><p>400 CPU cluster or 400 node botnet? Wonder where's he's getting the funding to pay for a farm like that? I mean you'd need to set up everything in advance of making any money off it. So again, where do the cycles come from I wonder.</p></htmltext>
<tokenext>" WPA Cracker gives you access to a 400CPU cluster that will run your network capture against a 135 million word dictionary created specifically for WPA passwords " 400 CPU cluster or 400 node botnet ?
Wonder where 's he 's getting the funding to pay for a farm like that ?
I mean you 'd need to set up everything in advance of making any money off it .
So again , where do the cycles come from I wonder .</tokentext>
<sentencetext>"WPA Cracker gives you access to a 400CPU cluster that will run your network capture against a 135 million word dictionary created specifically for WPA passwords"400 CPU cluster or 400 node botnet?
Wonder where's he's getting the funding to pay for a farm like that?
I mean you'd need to set up everything in advance of making any money off it.
So again, where do the cycles come from I wonder.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30366970</id>
	<title>Re:And Slashdot is promoting this</title>
	<author>kalirion</author>
	<datestamp>1260295260000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Because information wants to be free, dude!</p></htmltext>
<tokenext>Because information wants to be free , dude !</tokentext>
<sentencetext>Because information wants to be free, dude!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360436</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30363388</id>
	<title>Oracle</title>
	<author>dropper14</author>
	<datestamp>1260272760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>One more online cracking service for Oracle passwords: <a href="http://ops.conus.info/" title="conus.info" rel="nofollow">http://ops.conus.info/</a> [conus.info]</htmltext>
<tokenext>One more online cracking service for Oracle passwords : http : //ops.conus.info/ [ conus.info ]</tokentext>
<sentencetext>One more online cracking service for Oracle passwords: http://ops.conus.info/ [conus.info]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360866</id>
	<title>Nice for English people</title>
	<author>KlaasVaak</author>
	<datestamp>1260199980000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>What's the chance of this happening to a non-English speaker?  most of the development of this kind of tuff seems to be happening in the the US so hurray for the rest of the world I guess.</htmltext>
<tokenext>What 's the chance of this happening to a non-English speaker ?
most of the development of this kind of tuff seems to be happening in the the US so hurray for the rest of the world I guess .</tokentext>
<sentencetext>What's the chance of this happening to a non-English speaker?
most of the development of this kind of tuff seems to be happening in the the US so hurray for the rest of the world I guess.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361644</id>
	<title>Re:One problem</title>
	<author>Dan541</author>
	<datestamp>1260206640000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Because I really find value in testing my OWN network.</p></htmltext>
<tokenext>Because I really find value in testing my OWN network .</tokentext>
<sentencetext>Because I really find value in testing my OWN network.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360426</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361470</id>
	<title>Re:Build a dictionary!</title>
	<author>Anonymous</author>
	<datestamp>1260205080000</datestamp>
	<modclass>Funny</modclass>
	<modscore>4</modscore>
	<htmltext>No no no no, when you submit your password it will only appear as ***** to them.</htmltext>
<tokenext>No no no no , when you submit your password it will only appear as * * * * * to them .</tokentext>
<sentencetext>No no no no, when you submit your password it will only appear as ***** to them.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360384</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30363242</id>
	<title>We have a situation here</title>
	<author>gadget junkie</author>
	<datestamp>1260270120000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>In Italy, where I live, it is illegal to set up an unprotected wifi point, but since the vast majority of ADSL modem/routers are sold to homes or small businesses, I see a lot of unprotected access points, with names like  "D-link "; I doubt that getting people to use robust passwords would work as well as having them use ANY password.</htmltext>
<tokenext>In Italy , where I live , it is illegal to set up an unprotected wifi point , but since the vast majority of ADSL modem/routers are sold to homes or small businesses , I see a lot of unprotected access points , with names like " D-link " ; I doubt that getting people to use robust passwords would work as well as having them use ANY password .</tokentext>
<sentencetext>In Italy, where I live, it is illegal to set up an unprotected wifi point, but since the vast majority of ADSL modem/routers are sold to homes or small businesses, I see a lot of unprotected access points, with names like  "D-link "; I doubt that getting people to use robust passwords would work as well as having them use ANY password.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360526</id>
	<title>Re:One problem</title>
	<author>Enleth</author>
	<datestamp>1260197580000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Nothing a trip to the coffe shop around the corner won't fix.</p><p>A friend of mine has a modified ThinkPad fitted with threee WiFi adapters (one IWL, one Atheroes with AP/bridge functionality, another Atheros for quick scanning and data dumps on multiple channels) with external high-gain antennas and basically the only thing that keeps him from having net access virtually everywhere is the CPU power to crack keys. Luckily for him, the biggest telecom around here gives out wireless routers with preset (permanently!) WPA keys generated from the subsciption ID - they're all of the same length and share some character patterns, so a laptop CPU is able to crack them in a few hours. For others, he could be actually interested in such a service, maybe if it were a bit cheaper.</p></htmltext>
<tokenext>Nothing a trip to the coffe shop around the corner wo n't fix.A friend of mine has a modified ThinkPad fitted with threee WiFi adapters ( one IWL , one Atheroes with AP/bridge functionality , another Atheros for quick scanning and data dumps on multiple channels ) with external high-gain antennas and basically the only thing that keeps him from having net access virtually everywhere is the CPU power to crack keys .
Luckily for him , the biggest telecom around here gives out wireless routers with preset ( permanently !
) WPA keys generated from the subsciption ID - they 're all of the same length and share some character patterns , so a laptop CPU is able to crack them in a few hours .
For others , he could be actually interested in such a service , maybe if it were a bit cheaper .</tokentext>
<sentencetext>Nothing a trip to the coffe shop around the corner won't fix.A friend of mine has a modified ThinkPad fitted with threee WiFi adapters (one IWL, one Atheroes with AP/bridge functionality, another Atheros for quick scanning and data dumps on multiple channels) with external high-gain antennas and basically the only thing that keeps him from having net access virtually everywhere is the CPU power to crack keys.
Luckily for him, the biggest telecom around here gives out wireless routers with preset (permanently!
) WPA keys generated from the subsciption ID - they're all of the same length and share some character patterns, so a laptop CPU is able to crack them in a few hours.
For others, he could be actually interested in such a service, maybe if it were a bit cheaper.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360358</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360384</id>
	<title>Build a dictionary!</title>
	<author>Anonymous</author>
	<datestamp>1260196560000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>5</modscore>
	<htmltext><p>So for $34 you can make sure your password is part of their dictionary?</p></htmltext>
<tokenext>So for $ 34 you can make sure your password is part of their dictionary ?</tokentext>
<sentencetext>So for $34 you can make sure your password is part of their dictionary?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361088</id>
	<title>Re:Well at least you can say Moxie has Moxie.</title>
	<author>Hurricane78</author>
	<datestamp>1260201960000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>$20?? Pad me $10 offer a tool that generates an unlimited number of military-grade security passwords that even a young child can remember forever, and optionally also generates public/private keys to use in-between.</p><p>&lt;fearmongering&gt;Plus a guide on proper usage and a link list if you&rsquo;re interested in learning more about how to prevent your young daughter being online-raped, your partner being raped in the ass in prison because of someone framing her, and you getting caught by Chinese/Russian/American/Colombian/whatever intelligence and thrown in a gulag to be raped to the end of your life because you got cracked and were the central of the biggest botnet in human history.&lt;/fearmongering&gt;</p><p>Buy now! ^^</p></htmltext>
<tokenext>$ 20 ? ?
Pad me $ 10 offer a tool that generates an unlimited number of military-grade security passwords that even a young child can remember forever , and optionally also generates public/private keys to use in-between.Plus a guide on proper usage and a link list if you    re interested in learning more about how to prevent your young daughter being online-raped , your partner being raped in the ass in prison because of someone framing her , and you getting caught by Chinese/Russian/American/Colombian/whatever intelligence and thrown in a gulag to be raped to the end of your life because you got cracked and were the central of the biggest botnet in human history.Buy now !
^ ^</tokentext>
<sentencetext>$20??
Pad me $10 offer a tool that generates an unlimited number of military-grade security passwords that even a young child can remember forever, and optionally also generates public/private keys to use in-between.Plus a guide on proper usage and a link list if you’re interested in learning more about how to prevent your young daughter being online-raped, your partner being raped in the ass in prison because of someone framing her, and you getting caught by Chinese/Russian/American/Colombian/whatever intelligence and thrown in a gulag to be raped to the end of your life because you got cracked and were the central of the biggest botnet in human history.Buy now!
^^</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360460</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360178</id>
	<title>No comments?</title>
	<author>scurvy\_lubber</author>
	<datestamp>1260195060000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>0</modscore>
	<htmltext><p>Why not?</p></htmltext>
<tokenext>Why not ?</tokentext>
<sentencetext>Why not?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360476</id>
	<title>From the Article...</title>
	<author>BulletMagnet</author>
	<datestamp>1260197280000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext><p>"Marlinspike declined to say who operates his compute cluster"</p><p>I guess he can't come out and say he's using botted boxes, right?</p></htmltext>
<tokenext>" Marlinspike declined to say who operates his compute cluster " I guess he ca n't come out and say he 's using botted boxes , right ?</tokentext>
<sentencetext>"Marlinspike declined to say who operates his compute cluster"I guess he can't come out and say he's using botted boxes, right?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361330</id>
	<title>Re:who uses WPA anyways?</title>
	<author>Anonymous</author>
	<datestamp>1260204060000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>4</modscore>
	<htmltext><p>Believe it or not, there are some embedded devices which don't have the CPU juice for WPA2, so they were given a BIOS update so they can run something better than WEP as some form of security.  WPA has its issues, but it sure beats WEP.</p><p>The best wireless setup is to have two wireless SSIDs.  Your internal one that runs off of WPA2-Enterprise, RADIUS server, and smart cards.  Then an external one that has a stern packet filter and throttling mechanism.  This way, people can log on your open wireless to check E-mail, but Limewire and other P2P apps will be stopped.  Of course, someone can jump that, but if they do that, its not your problem anymore.</p><p>I do see one use for MAC address security, and its more of a legal thing than computer protection.  If a security breach criminal case winds up in court, and you can prove a potential intruder was bypassing your MAC security, it might land a conviction.  Otherwise, someone can make up a story of you allowing people to have your WPA2 passwords, etc.</p></htmltext>
<tokenext>Believe it or not , there are some embedded devices which do n't have the CPU juice for WPA2 , so they were given a BIOS update so they can run something better than WEP as some form of security .
WPA has its issues , but it sure beats WEP.The best wireless setup is to have two wireless SSIDs .
Your internal one that runs off of WPA2-Enterprise , RADIUS server , and smart cards .
Then an external one that has a stern packet filter and throttling mechanism .
This way , people can log on your open wireless to check E-mail , but Limewire and other P2P apps will be stopped .
Of course , someone can jump that , but if they do that , its not your problem anymore.I do see one use for MAC address security , and its more of a legal thing than computer protection .
If a security breach criminal case winds up in court , and you can prove a potential intruder was bypassing your MAC security , it might land a conviction .
Otherwise , someone can make up a story of you allowing people to have your WPA2 passwords , etc .</tokentext>
<sentencetext>Believe it or not, there are some embedded devices which don't have the CPU juice for WPA2, so they were given a BIOS update so they can run something better than WEP as some form of security.
WPA has its issues, but it sure beats WEP.The best wireless setup is to have two wireless SSIDs.
Your internal one that runs off of WPA2-Enterprise, RADIUS server, and smart cards.
Then an external one that has a stern packet filter and throttling mechanism.
This way, people can log on your open wireless to check E-mail, but Limewire and other P2P apps will be stopped.
Of course, someone can jump that, but if they do that, its not your problem anymore.I do see one use for MAC address security, and its more of a legal thing than computer protection.
If a security breach criminal case winds up in court, and you can prove a potential intruder was bypassing your MAC security, it might land a conviction.
Otherwise, someone can make up a story of you allowing people to have your WPA2 passwords, etc.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360724</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360452</id>
	<title>Re:One problem</title>
	<author>hey</author>
	<datestamp>1260197100000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Maybe somebody might want to crack their neighbor's wifi now so you so can connect if they have an outage.</p></htmltext>
<tokenext>Maybe somebody might want to crack their neighbor 's wifi now so you so can connect if they have an outage .</tokentext>
<sentencetext>Maybe somebody might want to crack their neighbor's wifi now so you so can connect if they have an outage.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360358</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360466</id>
	<title>Cloud?</title>
	<author>Anonymous</author>
	<datestamp>1260197220000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I'm not typically the one to bitch about terminology as this sort of technical jargon is in constant evolution and that's a normal and good thing, but, uh... cloud?  We've been calling this sort of setup a "cluster" for ages, there's no indication in TFA that this is geographically distributed, and it doesn't really do remote data storage or anything like that, which are just a few of the typical aspects of "cloud" crap I can think of off the top of my head.  How is this a "cloud" thing?</p></htmltext>
<tokenext>I 'm not typically the one to bitch about terminology as this sort of technical jargon is in constant evolution and that 's a normal and good thing , but , uh... cloud ? We 've been calling this sort of setup a " cluster " for ages , there 's no indication in TFA that this is geographically distributed , and it does n't really do remote data storage or anything like that , which are just a few of the typical aspects of " cloud " crap I can think of off the top of my head .
How is this a " cloud " thing ?</tokentext>
<sentencetext>I'm not typically the one to bitch about terminology as this sort of technical jargon is in constant evolution and that's a normal and good thing, but, uh... cloud?  We've been calling this sort of setup a "cluster" for ages, there's no indication in TFA that this is geographically distributed, and it doesn't really do remote data storage or anything like that, which are just a few of the typical aspects of "cloud" crap I can think of off the top of my head.
How is this a "cloud" thing?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30362922</id>
	<title>Re:Passwords that are found in dictionaries = FAIL</title>
	<author>wisty</author>
	<datestamp>1260265740000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>It's a horrible myth that L337SP33K is very secure. Special characters just aren't that great.</p><p>Try something like "the quick brown fox shat all over the lazy dog".</p><p>Or "twinkle twinkle like a rolling stone".</p><p>Or any other phrase that makes sense to your twisted and uniquely messed-up gray matter.</p><p>Plaintext is easier for a human to remember than quasi-random characters, and it will be just as secure.</p></htmltext>
<tokenext>It 's a horrible myth that L337SP33K is very secure .
Special characters just are n't that great.Try something like " the quick brown fox shat all over the lazy dog " .Or " twinkle twinkle like a rolling stone " .Or any other phrase that makes sense to your twisted and uniquely messed-up gray matter.Plaintext is easier for a human to remember than quasi-random characters , and it will be just as secure .</tokentext>
<sentencetext>It's a horrible myth that L337SP33K is very secure.
Special characters just aren't that great.Try something like "the quick brown fox shat all over the lazy dog".Or "twinkle twinkle like a rolling stone".Or any other phrase that makes sense to your twisted and uniquely messed-up gray matter.Plaintext is easier for a human to remember than quasi-random characters, and it will be just as secure.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360996</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360802</id>
	<title>Re:400 CPU cluster or 400 node botnet?</title>
	<author>mzito</author>
	<datestamp>1260199560000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>5</modscore>
	<htmltext><p>Actually, in this case, it's very straightforward.  He's using Amazon EC2.  EC2 charges by the hour, and all you have to do is spin up the number of servers you want.  In fact, I happened to run the numbers on what the costs are for running 50 "8-core" servers, and it happens to be...$34/hour.  So, what he did was say, "If I run two jobs an hour, I make a small amount of money.  If I run 4-5 jobs per hour, I make more money"</p><p>This is, of course, a textbook use case for EC2, and I'm surprised no one has done it sooner.</p></htmltext>
<tokenext>Actually , in this case , it 's very straightforward .
He 's using Amazon EC2 .
EC2 charges by the hour , and all you have to do is spin up the number of servers you want .
In fact , I happened to run the numbers on what the costs are for running 50 " 8-core " servers , and it happens to be... $ 34/hour .
So , what he did was say , " If I run two jobs an hour , I make a small amount of money .
If I run 4-5 jobs per hour , I make more money " This is , of course , a textbook use case for EC2 , and I 'm surprised no one has done it sooner .</tokentext>
<sentencetext>Actually, in this case, it's very straightforward.
He's using Amazon EC2.
EC2 charges by the hour, and all you have to do is spin up the number of servers you want.
In fact, I happened to run the numbers on what the costs are for running 50 "8-core" servers, and it happens to be...$34/hour.
So, what he did was say, "If I run two jobs an hour, I make a small amount of money.
If I run 4-5 jobs per hour, I make more money"This is, of course, a textbook use case for EC2, and I'm surprised no one has done it sooner.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360652</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30362864</id>
	<title>Re:400 CPU cluster or 400 node botnet?</title>
	<author>major\_clanger</author>
	<datestamp>1260264900000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>AWS terms of service (http://aws.amazon.com/agreement/#4b)

"you may not operate a site or service that:<nobr> <wbr></nobr>... Distributes, shares, or facilitates the distribution of unauthorized data, malware, viruses, Trojan horses, spyware, worms, or other malicious or harmful code (collectively, &ldquo;Harmful Components&rdquo;)."

It strikes me that a password-cracking service at least sails very close to the wind in respect of this clause.</htmltext>
<tokenext>AWS terms of service ( http : //aws.amazon.com/agreement/ # 4b ) " you may not operate a site or service that : ... Distributes , shares , or facilitates the distribution of unauthorized data , malware , viruses , Trojan horses , spyware , worms , or other malicious or harmful code ( collectively ,    Harmful Components    ) .
" It strikes me that a password-cracking service at least sails very close to the wind in respect of this clause .</tokentext>
<sentencetext>AWS terms of service (http://aws.amazon.com/agreement/#4b)

"you may not operate a site or service that: ... Distributes, shares, or facilitates the distribution of unauthorized data, malware, viruses, Trojan horses, spyware, worms, or other malicious or harmful code (collectively, “Harmful Components”).
"

It strikes me that a password-cracking service at least sails very close to the wind in respect of this clause.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360802</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360996</id>
	<title>Passwords that are found in dictionaries = FAIL!</title>
	<author>Anonymous</author>
	<datestamp>1260201180000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I&rsquo;m sorry, but if your password is found in a dictionary, you fail, and deserve to be cracked. I don&rsquo;t care if you&rsquo;re 50 year old steel worker with no higher education. You are still a human. The most intelligent being on the planet! Behave like one, would ya?</p><p>Protip: Adding just ONE special character to your password is going to wreck even faster brute force attacks. Let alone dictionary ones.<br>If you want your password being &ldquo;penis&rdquo;, and it complains that it&rsquo;s too short, no problem. Add a exclamation mark, or maybe more than one, and you&rsquo;re not good. You&rsquo;re great!<br>I repeat: &ldquo;penis&rdquo;: BAD. penis!!!1&ldquo;: GREAT. ^^</p><p>I found some other nice techniques:</p><p>1. Use 1337(0d3. ^^ (Or some other keys that only you know what they mean.)</p><p>2. (My favorite:) Draw one, two or even more big letters on your keyboard, using all the keys. This works especially well with a custom keyboard layout (I use the German Neo 2.0 layout, which is rather rare. Which makes it rather hard to enter the password on other keyboards though. Then again, that is a feature. As then nobody can log your input on his computer.)</p><p>3. If you can, use public key authentication. Let&rsquo;s see them brute-force a 2048 bit key!</p><p>X. Do them all together. E.g. draw &ldquo;p3n&ldquo; on the keys of your keyboard, to decrypt a public key.<br>But: No, I do *not* expect Joe Sixpack to know that. Then again, he also does not need it. It&rsquo;s just a bit of evolutionary advantage for us experts. ^^</p></htmltext>
<tokenext>I    m sorry , but if your password is found in a dictionary , you fail , and deserve to be cracked .
I don    t care if you    re 50 year old steel worker with no higher education .
You are still a human .
The most intelligent being on the planet !
Behave like one , would ya ? Protip : Adding just ONE special character to your password is going to wreck even faster brute force attacks .
Let alone dictionary ones.If you want your password being    penis    , and it complains that it    s too short , no problem .
Add a exclamation mark , or maybe more than one , and you    re not good .
You    re great ! I repeat :    penis    : BAD .
penis ! ! ! 1    : GREAT .
^ ^ I found some other nice techniques : 1 .
Use 1337 ( 0d3 .
^ ^ ( Or some other keys that only you know what they mean. ) 2 .
( My favorite : ) Draw one , two or even more big letters on your keyboard , using all the keys .
This works especially well with a custom keyboard layout ( I use the German Neo 2.0 layout , which is rather rare .
Which makes it rather hard to enter the password on other keyboards though .
Then again , that is a feature .
As then nobody can log your input on his computer. ) 3 .
If you can , use public key authentication .
Let    s see them brute-force a 2048 bit key ! X .
Do them all together .
E.g. draw    p3n    on the keys of your keyboard , to decrypt a public key.But : No , I do * not * expect Joe Sixpack to know that .
Then again , he also does not need it .
It    s just a bit of evolutionary advantage for us experts .
^ ^</tokentext>
<sentencetext>I’m sorry, but if your password is found in a dictionary, you fail, and deserve to be cracked.
I don’t care if you’re 50 year old steel worker with no higher education.
You are still a human.
The most intelligent being on the planet!
Behave like one, would ya?Protip: Adding just ONE special character to your password is going to wreck even faster brute force attacks.
Let alone dictionary ones.If you want your password being “penis”, and it complains that it’s too short, no problem.
Add a exclamation mark, or maybe more than one, and you’re not good.
You’re great!I repeat: “penis”: BAD.
penis!!!1“: GREAT.
^^I found some other nice techniques:1.
Use 1337(0d3.
^^ (Or some other keys that only you know what they mean.)2.
(My favorite:) Draw one, two or even more big letters on your keyboard, using all the keys.
This works especially well with a custom keyboard layout (I use the German Neo 2.0 layout, which is rather rare.
Which makes it rather hard to enter the password on other keyboards though.
Then again, that is a feature.
As then nobody can log your input on his computer.)3.
If you can, use public key authentication.
Let’s see them brute-force a 2048 bit key!X.
Do them all together.
E.g. draw “p3n“ on the keys of your keyboard, to decrypt a public key.But: No, I do *not* expect Joe Sixpack to know that.
Then again, he also does not need it.
It’s just a bit of evolutionary advantage for us experts.
^^</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360724</id>
	<title>who uses WPA anyways?</title>
	<author>Gothmolly</author>
	<datestamp>1260199020000</datestamp>
	<modclass>Funny</modclass>
	<modscore>2</modscore>
	<htmltext><p>Who uses WPA or WEP anyways?   Either you leech your neighbor's unprotected WiFi, you live far enough away from other homes so that your signal doesn't leave your property, or you maintain a separate DMZ of wireless IPs that can't get into the good stuff, but can access the Internet.</p><p>Next people will say that MAC address security is actually meaningful.</p></htmltext>
<tokenext>Who uses WPA or WEP anyways ?
Either you leech your neighbor 's unprotected WiFi , you live far enough away from other homes so that your signal does n't leave your property , or you maintain a separate DMZ of wireless IPs that ca n't get into the good stuff , but can access the Internet.Next people will say that MAC address security is actually meaningful .</tokentext>
<sentencetext>Who uses WPA or WEP anyways?
Either you leech your neighbor's unprotected WiFi, you live far enough away from other homes so that your signal doesn't leave your property, or you maintain a separate DMZ of wireless IPs that can't get into the good stuff, but can access the Internet.Next people will say that MAC address security is actually meaningful.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361698</id>
	<title>Re:360 simulatneous cracks would take 5 days.</title>
	<author>Dan541</author>
	<datestamp>1260207180000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>FTA:  20 minutes instead of 5 days.</p><p>If 360 people were using this system simultaneously,</p></div><p>There aren't that many idiots here. They're all at the mall.</p></div>
	</htmltext>
<tokenext>FTA : 20 minutes instead of 5 days.If 360 people were using this system simultaneously,There are n't that many idiots here .
They 're all at the mall .</tokentext>
<sentencetext>FTA:  20 minutes instead of 5 days.If 360 people were using this system simultaneously,There aren't that many idiots here.
They're all at the mall.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361036</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361806</id>
	<title>Or use your gpu that isn't doing much anyway.</title>
	<author>nodrog</author>
	<datestamp>1260208440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>There's a piece of free software <a href="http://code.google.com/p/pyrit/" title="google.com" rel="nofollow">http://code.google.com/p/pyrit/</a> [google.com] that could crunch through 135 million passwords in a few hours.<br>On my GTX275 it would take about 3.5 hours. I think i will save myself $34.</p></htmltext>
<tokenext>There 's a piece of free software http : //code.google.com/p/pyrit/ [ google.com ] that could crunch through 135 million passwords in a few hours.On my GTX275 it would take about 3.5 hours .
I think i will save myself $ 34 .</tokentext>
<sentencetext>There's a piece of free software http://code.google.com/p/pyrit/ [google.com] that could crunch through 135 million passwords in a few hours.On my GTX275 it would take about 3.5 hours.
I think i will save myself $34.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30370432</id>
	<title>Re:From the Article...</title>
	<author>Anonymous</author>
	<datestamp>1260267240000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Yep, and if your password is crackable, you get to join the botnet, too!</p></htmltext>
<tokenext>Yep , and if your password is crackable , you get to join the botnet , too !</tokentext>
<sentencetext>Yep, and if your password is crackable, you get to join the botnet, too!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360476</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30363774</id>
	<title>Re:who uses WPA anyways?</title>
	<author>cenc</author>
	<datestamp>1260277920000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I live in a country where most of the major ISP's provide DSL and cable modems (I would say around 40\% of the country has one these) boxes with wireless and only WEP encryption ( they claim much of the country still only uses WEP when asked ). They do not provide most of the time a way to modify this, and most users would not know how anyway.</p><p>Even worse, most use a predictable well known formula for generating the password, that is based on publicly available information. Essentially you need to know two pieces of information about the home owner. Name and tax payer id number. In fact, you could likly input the name of all ISP customers and their tax payer id number in to database, and have instant free wireless connection anywhere in the country there is a wireless signal without cracking.  Small country, so we are talking about 1-2 million possible open connections, without needing to capture packets.</p></htmltext>
<tokenext>I live in a country where most of the major ISP 's provide DSL and cable modems ( I would say around 40 \ % of the country has one these ) boxes with wireless and only WEP encryption ( they claim much of the country still only uses WEP when asked ) .
They do not provide most of the time a way to modify this , and most users would not know how anyway.Even worse , most use a predictable well known formula for generating the password , that is based on publicly available information .
Essentially you need to know two pieces of information about the home owner .
Name and tax payer id number .
In fact , you could likly input the name of all ISP customers and their tax payer id number in to database , and have instant free wireless connection anywhere in the country there is a wireless signal without cracking .
Small country , so we are talking about 1-2 million possible open connections , without needing to capture packets .</tokentext>
<sentencetext>I live in a country where most of the major ISP's provide DSL and cable modems (I would say around 40\% of the country has one these) boxes with wireless and only WEP encryption ( they claim much of the country still only uses WEP when asked ).
They do not provide most of the time a way to modify this, and most users would not know how anyway.Even worse, most use a predictable well known formula for generating the password, that is based on publicly available information.
Essentially you need to know two pieces of information about the home owner.
Name and tax payer id number.
In fact, you could likly input the name of all ISP customers and their tax payer id number in to database, and have instant free wireless connection anywhere in the country there is a wireless signal without cracking.
Small country, so we are talking about 1-2 million possible open connections, without needing to capture packets.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360724</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30364724</id>
	<title>Re:One problem</title>
	<author>ceoyoyo</author>
	<datestamp>1260285540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Riiight.  It does a dictionary attack on the password.  Want to know if your wifi is secure against this?  Does it have a dictionary word in it?  Then no.  Is it a random string?  Then yes.</p><p>You can pay me now.</p></htmltext>
<tokenext>Riiight .
It does a dictionary attack on the password .
Want to know if your wifi is secure against this ?
Does it have a dictionary word in it ?
Then no .
Is it a random string ?
Then yes.You can pay me now .</tokentext>
<sentencetext>Riiight.
It does a dictionary attack on the password.
Want to know if your wifi is secure against this?
Does it have a dictionary word in it?
Then no.
Is it a random string?
Then yes.You can pay me now.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360426</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30362524</id>
	<title>Re:Passwords that are found in dictionaries = FAIL</title>
	<author>MortenMW</author>
	<datestamp>1260302940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>So.... I guess you really like penises?</htmltext>
<tokenext>So.... I guess you really like penises ?</tokentext>
<sentencetext>So.... I guess you really like penises?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360996</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360438</id>
	<title>Re:One problem</title>
	<author>Anonymous</author>
	<datestamp>1260196980000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Well, you could impress a client if you were a security contractor.  For $35, that's a bargain!  You could also screw with your neighbor... if they so deserve it.</htmltext>
<tokenext>Well , you could impress a client if you were a security contractor .
For $ 35 , that 's a bargain !
You could also screw with your neighbor... if they so deserve it .</tokentext>
<sentencetext>Well, you could impress a client if you were a security contractor.
For $35, that's a bargain!
You could also screw with your neighbor... if they so deserve it.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360358</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360662</id>
	<title>Re:One problem</title>
	<author>Anonymous</author>
	<datestamp>1260198540000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>5</modscore>
	<htmltext><p>Alternatively you could actually not be an asshat, get on with your neighbour and negotiate with them (over a 6 pack of beer) to allow legal access in the event of an outage.</p></htmltext>
<tokenext>Alternatively you could actually not be an asshat , get on with your neighbour and negotiate with them ( over a 6 pack of beer ) to allow legal access in the event of an outage .</tokentext>
<sentencetext>Alternatively you could actually not be an asshat, get on with your neighbour and negotiate with them (over a 6 pack of beer) to allow legal access in the event of an outage.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360452</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30362386</id>
	<title>Re:who uses WPA anyways?</title>
	<author>angelbunny</author>
	<datestamp>1260214740000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Do not underestimate wifi distance.</p><p>Years ago I was bored so I made a cantenna (sp?) and was able to crack wep from wifi sources a couple of miles out. (it was a pain in the ass but a fun experience)</p><p>To be fair, I'm on a slight hill, the can was in the attic of a two story house pointing out on a mount that I could angle quite precisely to get a signal. If even a slight gust of wind would come by (not enough to visibly notice shaking) it would kill the signal. But yes, a couple of <b>miles</b> out.</p></htmltext>
<tokenext>Do not underestimate wifi distance.Years ago I was bored so I made a cantenna ( sp ?
) and was able to crack wep from wifi sources a couple of miles out .
( it was a pain in the ass but a fun experience ) To be fair , I 'm on a slight hill , the can was in the attic of a two story house pointing out on a mount that I could angle quite precisely to get a signal .
If even a slight gust of wind would come by ( not enough to visibly notice shaking ) it would kill the signal .
But yes , a couple of miles out .</tokentext>
<sentencetext>Do not underestimate wifi distance.Years ago I was bored so I made a cantenna (sp?
) and was able to crack wep from wifi sources a couple of miles out.
(it was a pain in the ass but a fun experience)To be fair, I'm on a slight hill, the can was in the attic of a two story house pointing out on a mount that I could angle quite precisely to get a signal.
If even a slight gust of wind would come by (not enough to visibly notice shaking) it would kill the signal.
But yes, a couple of miles out.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360724</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30362714</id>
	<title>Re:Build a dictionary!</title>
	<author>theTerribleRobbo</author>
	<datestamp>1260305640000</datestamp>
	<modclass>Funny</modclass>
	<modscore>2</modscore>
	<htmltext><p>Holy shit. How did you get my password?</p></htmltext>
<tokenext>Holy shit .
How did you get my password ?</tokentext>
<sentencetext>Holy shit.
How did you get my password?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361470</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360464</id>
	<title>Which is why...</title>
	<author>Darth Turbogeek</author>
	<datestamp>1260197220000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>... you dont use d!ct!0n@ryw0rd50r@tl3@st make them hard to be brute forced.</p><p>I cant really see how this is service is  legal but I am willing to be educated how it could be.</p></htmltext>
<tokenext>... you dont use d ! ct ! 0n @ ryw0rd50r @ tl3 @ st make them hard to be brute forced.I cant really see how this is service is legal but I am willing to be educated how it could be .</tokentext>
<sentencetext>... you dont use d!ct!0n@ryw0rd50r@tl3@st make them hard to be brute forced.I cant really see how this is service is  legal but I am willing to be educated how it could be.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30362920</id>
	<title>Pay for a service thats not even guaranteed!</title>
	<author>DNX Blandy</author>
	<datestamp>1260265740000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I should know, I do deauthentication attacks against WPA-PSK encrypted networks, hence my site has a few captured packets then need cracking:

<a href="http://www.md5decrypter.co.uk/forum/forum\_topics.asp?FID=9" title="md5decrypter.co.uk" rel="nofollow">http://www.md5decrypter.co.uk/forum/forum\_topics.asp?FID=9</a> [md5decrypter.co.uk]

I currently only have 1 cracked but tbh, as long as you use a very good password, no one is going to crack it. We'll all have to wait until someone figures out a major hole like in the WEP encryption<nobr> <wbr></nobr>;) 5-10 mins, no problem!!</htmltext>
<tokenext>I should know , I do deauthentication attacks against WPA-PSK encrypted networks , hence my site has a few captured packets then need cracking : http : //www.md5decrypter.co.uk/forum/forum \ _topics.asp ? FID = 9 [ md5decrypter.co.uk ] I currently only have 1 cracked but tbh , as long as you use a very good password , no one is going to crack it .
We 'll all have to wait until someone figures out a major hole like in the WEP encryption ; ) 5-10 mins , no problem !
!</tokentext>
<sentencetext>I should know, I do deauthentication attacks against WPA-PSK encrypted networks, hence my site has a few captured packets then need cracking:

http://www.md5decrypter.co.uk/forum/forum\_topics.asp?FID=9 [md5decrypter.co.uk]

I currently only have 1 cracked but tbh, as long as you use a very good password, no one is going to crack it.
We'll all have to wait until someone figures out a major hole like in the WEP encryption ;) 5-10 mins, no problem!
!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360756</id>
	<title>Re:400 CPU cluster or 400 node botnet?</title>
	<author>Shadow-isoHunt</author>
	<datestamp>1260199200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>It's not difficult to find rainbow tables for WPA-PSK(special in that they're salted(with the SSID) hashes) in community rainbow table projects. Think BOINC - the same goes for LM/NTLM/MD5/SHA1 too.</htmltext>
<tokenext>It 's not difficult to find rainbow tables for WPA-PSK ( special in that they 're salted ( with the SSID ) hashes ) in community rainbow table projects .
Think BOINC - the same goes for LM/NTLM/MD5/SHA1 too .</tokentext>
<sentencetext>It's not difficult to find rainbow tables for WPA-PSK(special in that they're salted(with the SSID) hashes) in community rainbow table projects.
Think BOINC - the same goes for LM/NTLM/MD5/SHA1 too.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360652</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360800</id>
	<title>bad ass...</title>
	<author>adosch</author>
	<datestamp>1260199560000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>This is bad ass and probably worth the $17 for the half-CPU cluster time.  However, on a sour note, I can see it getting abused for it's short worth of security affirmation.  With monetary gain at stake, I can imagine funding this service is going to far outweigh validating who's using it for malicious intent.  It's a far stretch and would get rather expensive for some d0uch3b4g pwning neighboor networks, but if there a network of value to get into, the $17 (or $34) can't even fill my gas take.</htmltext>
<tokenext>This is bad ass and probably worth the $ 17 for the half-CPU cluster time .
However , on a sour note , I can see it getting abused for it 's short worth of security affirmation .
With monetary gain at stake , I can imagine funding this service is going to far outweigh validating who 's using it for malicious intent .
It 's a far stretch and would get rather expensive for some d0uch3b4g pwning neighboor networks , but if there a network of value to get into , the $ 17 ( or $ 34 ) ca n't even fill my gas take .</tokentext>
<sentencetext>This is bad ass and probably worth the $17 for the half-CPU cluster time.
However, on a sour note, I can see it getting abused for it's short worth of security affirmation.
With monetary gain at stake, I can imagine funding this service is going to far outweigh validating who's using it for malicious intent.
It's a far stretch and would get rather expensive for some d0uch3b4g pwning neighboor networks, but if there a network of value to get into, the $17 (or $34) can't even fill my gas take.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360746</id>
	<title>If it can be brute forced you're doing it wrong</title>
	<author>Anonymous</author>
	<datestamp>1260199140000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Nobody is going to brute force my randomly generated 63 character alphanumeric key. Not before a vulnerability in the encryption appears or the hardware gets replaced with a new standard</p></htmltext>
<tokenext>Nobody is going to brute force my randomly generated 63 character alphanumeric key .
Not before a vulnerability in the encryption appears or the hardware gets replaced with a new standard</tokentext>
<sentencetext>Nobody is going to brute force my randomly generated 63 character alphanumeric key.
Not before a vulnerability in the encryption appears or the hardware gets replaced with a new standard</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360394</id>
	<title>And now...</title>
	<author>Anonymous</author>
	<datestamp>1260196680000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>we have your Password and IP, thanks!</p></htmltext>
<tokenext>we have your Password and IP , thanks !</tokentext>
<sentencetext>we have your Password and IP, thanks!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361760</id>
	<title>Re:Build a dictionary!</title>
	<author>Macrat</author>
	<datestamp>1260207900000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>That's what they want you to think.</htmltext>
<tokenext>That 's what they want you to think .</tokentext>
<sentencetext>That's what they want you to think.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361470</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360512</id>
	<title>Re:One problem</title>
	<author>Logic Worshipper</author>
	<datestamp>1260197460000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Yeah, I'm sure that's the actual usage they're expecting.</p></htmltext>
<tokenext>Yeah , I 'm sure that 's the actual usage they 're expecting .</tokentext>
<sentencetext>Yeah, I'm sure that's the actual usage they're expecting.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360426</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360638</id>
	<title>Re:One problem</title>
	<author>Shakrai</author>
	<datestamp>1260198360000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>I think the tool is not being sold to people wanting to crack into a WiFi network, rather selling to people so that they can test their WiFi network.</p></div><p>And the majority of bittorrent traffic is Linux torrents and WoW patches.....</p></div>
	</htmltext>
<tokenext>I think the tool is not being sold to people wanting to crack into a WiFi network , rather selling to people so that they can test their WiFi network.And the majority of bittorrent traffic is Linux torrents and WoW patches.... .</tokentext>
<sentencetext>I think the tool is not being sold to people wanting to crack into a WiFi network, rather selling to people so that they can test their WiFi network.And the majority of bittorrent traffic is Linux torrents and WoW patches.....
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360426</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360436</id>
	<title>And Slashdot is promoting this</title>
	<author>Anonymous</author>
	<datestamp>1260196980000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>1</modscore>
	<htmltext><p>because?</p></htmltext>
<tokenext>because ?</tokentext>
<sentencetext>because?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360472</id>
	<title>New Marketing Campaign</title>
	<author>zet0n</author>
	<datestamp>1260197220000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>Steal your neighbors' wireless for a one time fee of thirty four dollars. Sixty percent of the time, it works every time.</htmltext>
<tokenext>Steal your neighbors ' wireless for a one time fee of thirty four dollars .
Sixty percent of the time , it works every time .</tokentext>
<sentencetext>Steal your neighbors' wireless for a one time fee of thirty four dollars.
Sixty percent of the time, it works every time.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361036</id>
	<title>360 simulatneous cracks would take 5 days.</title>
	<author>Anonymous</author>
	<datestamp>1260201480000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>FTA:  20 minutes instead of 5 days.</p><p>If 360 people were using this system simultaneously, and God forbid there be more than that, you would be better off running the crack yourself.</p></htmltext>
<tokenext>FTA : 20 minutes instead of 5 days.If 360 people were using this system simultaneously , and God forbid there be more than that , you would be better off running the crack yourself .</tokentext>
<sentencetext>FTA:  20 minutes instead of 5 days.If 360 people were using this system simultaneously, and God forbid there be more than that, you would be better off running the crack yourself.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360628</id>
	<title>It's actually $17 for 40 min.</title>
	<author>Anonymous</author>
	<datestamp>1260198360000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>...$34 is the super-fast price.</p></htmltext>
<tokenext>... $ 34 is the super-fast price .</tokentext>
<sentencetext>...$34 is the super-fast price.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361386</id>
	<title>Re:who uses WPA anyways?</title>
	<author>bigstrat2003</author>
	<datestamp>1260204420000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>All forms of security are flawed, if that's what you're getting at. The goal is not to make it impossible to break into your space (be it computer network, home, whatever), but to make it difficult enough that it's not worth the attacker's trouble. I fail to see why you're bashing things like wireless encryption or MAC filtering for not being perfect, when you ought to realize this simple truth.</p><p>I mean, let's look at your example of "your signal doesn't leave your property". If your attacker cares enough to crack your WPA, do you really think he isn't going to care enough to walk onto your property? Of course not. Either he's looking for low-hanging fruit, in which case he moves on to an open wireless network, or he's looking for <i>you</i>, specifically, in which case nothing is going to save you if he knows what he's doing (because failing everything else, there's always physical break-in and forcing you to give up your data).</p></htmltext>
<tokenext>All forms of security are flawed , if that 's what you 're getting at .
The goal is not to make it impossible to break into your space ( be it computer network , home , whatever ) , but to make it difficult enough that it 's not worth the attacker 's trouble .
I fail to see why you 're bashing things like wireless encryption or MAC filtering for not being perfect , when you ought to realize this simple truth.I mean , let 's look at your example of " your signal does n't leave your property " .
If your attacker cares enough to crack your WPA , do you really think he is n't going to care enough to walk onto your property ?
Of course not .
Either he 's looking for low-hanging fruit , in which case he moves on to an open wireless network , or he 's looking for you , specifically , in which case nothing is going to save you if he knows what he 's doing ( because failing everything else , there 's always physical break-in and forcing you to give up your data ) .</tokentext>
<sentencetext>All forms of security are flawed, if that's what you're getting at.
The goal is not to make it impossible to break into your space (be it computer network, home, whatever), but to make it difficult enough that it's not worth the attacker's trouble.
I fail to see why you're bashing things like wireless encryption or MAC filtering for not being perfect, when you ought to realize this simple truth.I mean, let's look at your example of "your signal doesn't leave your property".
If your attacker cares enough to crack your WPA, do you really think he isn't going to care enough to walk onto your property?
Of course not.
Either he's looking for low-hanging fruit, in which case he moves on to an open wireless network, or he's looking for you, specifically, in which case nothing is going to save you if he knows what he's doing (because failing everything else, there's always physical break-in and forcing you to give up your data).</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360724</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360426</id>
	<title>Re:One problem</title>
	<author>Anonymous</author>
	<datestamp>1260196980000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext>I think the tool is not being sold to people wanting to crack into a WiFi network, rather selling to people so that they can test their WiFi network.</htmltext>
<tokenext>I think the tool is not being sold to people wanting to crack into a WiFi network , rather selling to people so that they can test their WiFi network .</tokentext>
<sentencetext>I think the tool is not being sold to people wanting to crack into a WiFi network, rather selling to people so that they can test their WiFi network.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360358</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30365840</id>
	<title>Re:One problem</title>
	<author>Anonymous</author>
	<datestamp>1260290340000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>Sweet setup. If he needs processing power to crack WPA keys, couldn't he "outsource" the job to a 6-core i7 machine at home? He'd need to have a connection of course but it's possible.
<br> <br>
Wardrive, d/c clients and capture reauth data (and MAC addresses), send to i7 machine via open access point, retrieve keys later, have connectivity the next time you pass through that area.</htmltext>
<tokenext>Sweet setup .
If he needs processing power to crack WPA keys , could n't he " outsource " the job to a 6-core i7 machine at home ?
He 'd need to have a connection of course but it 's possible .
Wardrive , d/c clients and capture reauth data ( and MAC addresses ) , send to i7 machine via open access point , retrieve keys later , have connectivity the next time you pass through that area .</tokentext>
<sentencetext>Sweet setup.
If he needs processing power to crack WPA keys, couldn't he "outsource" the job to a 6-core i7 machine at home?
He'd need to have a connection of course but it's possible.
Wardrive, d/c clients and capture reauth data (and MAC addresses), send to i7 machine via open access point, retrieve keys later, have connectivity the next time you pass through that area.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360526</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30363686</id>
	<title>5 days?</title>
	<author>Bert64</author>
	<datestamp>1260276480000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Assuming 5 days for a dual core, and thus 2.5-3 days for a quad core, that's not really a huge amount of time on a machine that's easily available. I certainly wouldn't want to spend $34 when i can just leave a spare quad core box running this in the background for a few days.</p></htmltext>
<tokenext>Assuming 5 days for a dual core , and thus 2.5-3 days for a quad core , that 's not really a huge amount of time on a machine that 's easily available .
I certainly would n't want to spend $ 34 when i can just leave a spare quad core box running this in the background for a few days .</tokentext>
<sentencetext>Assuming 5 days for a dual core, and thus 2.5-3 days for a quad core, that's not really a huge amount of time on a machine that's easily available.
I certainly wouldn't want to spend $34 when i can just leave a spare quad core box running this in the background for a few days.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360992</id>
	<title>Re:400 CPU cluster or 400 node botnet?</title>
	<author>Anonymous</author>
	<datestamp>1260201120000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Obviously, the "CPUs" opted in for free labor when they used one of the 135 million words as the password.</p></htmltext>
<tokenext>Obviously , the " CPUs " opted in for free labor when they used one of the 135 million words as the password .</tokentext>
<sentencetext>Obviously, the "CPUs" opted in for free labor when they used one of the 135 million words as the password.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360652</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30370088</id>
	<title>Re:Build a dictionary!</title>
	<author>qmaqdk</author>
	<datestamp>1260265740000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Oblig.:</p><p><a href="http://bash.org/?quote=244321" title="bash.org">http://bash.org/?quote=244321</a> [bash.org]</p></div>
	</htmltext>
<tokenext>Oblig .
: http : //bash.org/ ? quote = 244321 [ bash.org ]</tokentext>
<sentencetext>Oblig.
:http://bash.org/?quote=244321 [bash.org]
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361470</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30363354</id>
	<title>Oracle</title>
	<author>Anonymous</author>
	<datestamp>1260272460000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Almost the same thing about Oracle passwords: http://ops.conus.info/</p></htmltext>
<tokenext>Almost the same thing about Oracle passwords : http : //ops.conus.info/</tokentext>
<sentencetext>Almost the same thing about Oracle passwords: http://ops.conus.info/</sentencetext>
</comment>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_32</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360864
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360652
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361760
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361470
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360384
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_17</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361386
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360724
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_24</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360438
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360358
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360662
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360452
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360358
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361682
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361470
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360384
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30366390
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360802
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360652
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_29</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360586
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360358
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360638
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360426
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360358
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_30</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30370432
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360476
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30365840
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360526
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360358
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_28</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30362922
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360996
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_33</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30366970
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360436
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_18</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30362762
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360652
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_23</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30362386
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360724
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360512
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360426
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360358
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30362864
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360802
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360652
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_31</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361088
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360460
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_22</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30377768
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361470
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360384
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_21</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361692
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360652
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30370088
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361470
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360384
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360992
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360652
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30363774
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360724
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30370192
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360996
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_27</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30365092
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360464
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_20</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360756
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360652
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30362714
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361470
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360384
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360878
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360436
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361698
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361036
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_19</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361460
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360426
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360358
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361644
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360426
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360358
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_26</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30362524
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360996
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_25</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361330
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360724
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_2322235_16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30364724
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360426
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360358
</commentlist>
</thread>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_2322235.11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360866
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_2322235.12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360460
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361088
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_2322235.8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360384
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361470
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30377768
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30370088
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30362714
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361760
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361682
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_2322235.15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360358
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360452
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360662
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360438
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360586
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360426
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30364724
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361644
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360638
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360512
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361460
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360526
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30365840
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_2322235.10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360652
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360864
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361692
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360802
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30362864
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30366390
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360756
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360992
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30362762
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_2322235.6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360724
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361386
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30363774
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361330
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30362386
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_2322235.13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360448
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_2322235.0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360436
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360878
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30366970
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_2322235.9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360464
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30365092
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_2322235.7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360466
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_2322235.14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361036
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30361698
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_2322235.1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360458
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_2322235.4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360996
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30362524
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30370192
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30362922
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_2322235.2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360746
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_2322235.5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360476
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30370432
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_2322235.3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_2322235.30360178
</commentlist>
</conversation>
