Identify Backdoors in Firmware By Using Automatic String Analysis http://blog.ioactive.com/2013/05/identify-back-doors-in-firmware-by.html
Identify Backdoors in Firmware By Using Automatic String Analysis http://blog.ioactive.com/2013/05/identify-back-doors-in-firmware-by.html
Cracking 16 Character Strong passwords in less than an hour http://thehackernews.com/2013/05/cracking-16-character-strong-passwords.html