Password cracking

In cryptanalysis and computer security, password cracking is the process of guessing passwords[1] protecting a computer system. A common approach (brute-force attack) is to repeatedly try guesses for the password and to check them against an available cryptographic hash of the password.[2] Another type of approach is password spraying, which is often automated and occurs slowly over time in order to remain undetected, using a list of common passwords.[3]

The purpose of password cracking might be to help a user recover a forgotten password (due to the fact that installing an entirely new password would involve System Administration privileges), to gain unauthorized access to a system, or to act as a preventive measure whereby system administrators check for easily crackable passwords. On a file-by-file basis, password cracking is utilized to gain access to digital evidence to which a judge has allowed access, when a particular file's permissions restricted.

Time needed for password searches

The time to crack a password is related to bit strength, which is a measure of the password's entropy, and the details of how the password is stored. Most methods of password cracking require the computer to produce many candidate passwords, each of which is checked. One example is brute-force cracking, in which a computer tries every possible key or password until it succeeds. With multiple processors, this time can be optimized through searching from the last possible group of symbols and the beginning at the same time, with other processors being placed to search through a designated selection of possible passwords.[4] More common methods of password cracking, such as dictionary attacks, pattern checking, and variations of common words, aim to optimize the number of guesses and are usually attempted before brute-force attacks. Higher password bit strength exponentially increases the number of candidate passwords that must be checked, on average, to recover the password and reduces the likelihood that the password will be found in any cracking dictionary.[5]

The ability to crack passwords using computer programs is also a function of the number of possible passwords per second which can be checked. If a hash of the target password is available to the attacker, this number can be in the billions or trillions per second, since an offline attack is possible. If not, the rate depends on whether the authentication software limits how often a password can be tried, either by time delays, CAPTCHAs, or forced lockouts after some number of failed attempts. Another situation where quick guessing is possible is when the password is used to form a cryptographic key. In such cases, an attacker can quickly check to see if a guessed password successfully decodes encrypted data.

For some kinds of password hash, ordinary desktop computers can test over a hundred million passwords per second using password cracking tools running on a general purpose CPU and billions of passwords per second using GPU-based password cracking tools[1][6][7] (see John the Ripper benchmarks).[8] The rate of password guessing depends heavily on the cryptographic function used by the system to generate password hashes. A suitable password hashing function, such as bcrypt, is many orders of magnitude better than a naive function like simple MD5 or SHA. A user-selected eight-character password with numbers, mixed case, and symbols, with commonly selected passwords and other dictionary matches filtered out, reaches an estimated 30-bit strength, according to NIST. 230 is only one billion permutations[9] and would be cracked in seconds if the hashing function were naive. When ordinary desktop computers are combined in a cracking effort, as can be done with botnets, the capabilities of password cracking are considerably extended. In 2002, distributed.net successfully found a 64-bit RC5 key in four years, in an effort which included over 300,000 different computers at various times, and which generated an average of over 12 billion keys per second.[10]

Graphics processing units can speed up password cracking by a factor of 50 to 100 over general purpose computers for specific hashing algorithms. As an example, in 2011, available commercial products claimed the ability to test up to 2,800,000,000 NTLM passwords a second on a standard desktop computer using a high-end graphics processor.[11] Such a device can crack a 10-letter single-case password in one day. The work can be distributed over many computers for an additional speedup proportional to the number of available computers with comparable GPUs. However some algorithms run slowly, or even are specifically designed to run slowly, on GPUs. Examples are DES, Triple DES, bcrypt, scrypt, and Argon2.

Hardware acceleration in a GPU has enabled resources to be used to increase the efficiency and speed of a brute force attack for most hashing algorithms. In 2012, Stricture Consulting Group unveiled a 25-GPU cluster that achieved a brute force attack speed of 350 billion guesses of NTLM passwords per second, allowing them to check password combinations in 5.5 hours, enough to crack all 8-character alpha-numeric-special-character passwords commonly used in enterprise settings. Using ocl-Hashcat Plus on a Virtual OpenCL cluster platform,[12] the Linux-based GPU cluster was used to "crack 90 percent of the 6.5 million password hashes belonging to users of LinkedIn".[13]

For some specific hashing algorithms, CPUs and GPUs are not a good match. Purpose-made hardware is required to run at high speeds. Custom hardware can be made using FPGA or ASIC technology. Development for both technologies is complex and (very) expensive. In general, FPGAs are favorable in small quantities, ASICs are favorable in (very) large quantities, more energy efficient, and faster. In 1998, the Electronic Frontier Foundation (EFF) built a dedicated password cracker using ASICs. Their machine, Deep Crack, broke a DES 56-bit key in 56 hours, testing over 90 billion keys per second.[14] In 2017, leaked documents showed that ASICs were used for a military project that had a potential to code-break many parts of the Internet communications with weaker encryption.[15] Since 2019, John the Ripper supports password cracking for a limited number of hashing algorithms using FPGAs.[16] Commercial companies are now using FPGA-based setups for password cracking.[17]

Easy to remember, hard to guess

Passwords that are difficult to remember will reduce the security of a system because

  • users might need to write down or electronically store the password using an insecure method,
  • users will need frequent password resets, and
  • users are more likely to re-use the same password.

Similarly, the more stringent the requirements for password strength, e.g. "have a mix of uppercase and lowercase letters and digits" or "change it monthly", the greater the degree to which users will subvert the system.[18]

In "The Memorability and Security of Passwords",[19] Jeff Yan et al. examine the effect of advice given to users about a good choice of password. They found that passwords based on thinking of a phrase and taking the first letter of each word are just as memorable as naively selected passwords, and just as hard to crack as randomly generated passwords. Combining two unrelated words is another good method. Having a personally designed "algorithm" for generating obscure passwords is another good method.

However, asking users to remember a password consisting of a "mix of uppercase and lowercase characters" is similar to asking them to remember a sequence of bits: hard to remember, and only a little bit harder to crack (e.g. only 128 times harder to crack for 7-letter passwords, less if the user simply capitalizes one of the letters). Asking users to use "both letters and digits" will often lead to easy-to-guess substitutions such as 'E' → '3' and 'I' → '1': substitutions which are well known to attackers. Similarly, typing the password one keyboard row higher is a common trick known to attackers.

Research detailed in an April 2015 paper by several professors at Carnegie Mellon University shows that people's choices of password structure often follow several known patterns. For example, when password requirements require a long minimum length such as 16 characters, people tend to repeat characters or even entire words within their passwords.[20] As a result, passwords may be much more easily cracked than their mathematical probabilities would otherwise indicate. Passwords containing one digit, for example, disproportionately include it at the end of the password.[20]

Incidents

On July 16, 1998, CERT reported an incident where an attacker had found 186,126 encrypted passwords. By the time the breach was discovered, 47,642 passwords had already been cracked.[21]

In December 2009, a major password breach of Rockyou.com occurred that led to the release of 32 million passwords. The attacker then leaked the full list of the 32 million passwords (with no other identifiable information) to the internet. Passwords were stored in cleartext in the database and were extracted through an SQL injection vulnerability. The Imperva Application Defense Center (ADC) did an analysis on the strength of the passwords.[22] Some of the key findings were:

  • about 30% of users chose passwords whose length was below seven characters,
  • almost 60% of users chose their passwords from a limited set of alpha-numeric characters, and
  • nearly 50% of users used names, slang words, dictionary words, or trivial passwords that employed weak constructs such as consecutive digits and/or adjacent keyboard keys — case in point, the most common password among RockYou account owners was simply “123456”.[22]

In June 2011, NATO (North Atlantic Treaty Organization) suffered a security breach that led to the public release of first and last names, usernames, and passwords of more than 11,000 registered users of their e-bookshop. The data were leaked as part of Operation AntiSec, a movement that includes Anonymous, LulzSec, and other hacking groups and individuals.[23]

On July 11, 2011, Booz Allen Hamilton, a large American consulting firm that does a substantial amount of work for the Pentagon, had its servers hacked by Anonymous and leaked the same day. "The leak, dubbed 'Military Meltdown Monday', includes 90,000 logins of military personnel—including personnel from USCENTCOM, SOCOM, the Marine Corps, various Air Force facilities, Homeland Security, State Department staff, and what looks like private-sector contractors."[24] These leaked passwords were found to be hashed with unsalted SHA-1, and were later analyzed by the ADC team at Imperva, revealing that even some military personnel used passwords as weak as "1234".[25]

On July 18, 2011, Microsoft Hotmail banned the password: "123456".[26]

In July 2015, a group calling itself "The Impact Team" stole the user data of Ashley Madison.[27] Many passwords were hashed using both the relatively strong bcrypt algorithm and the weaker MD5 hash. Attacking the latter algorithm allowed some 11 million plaintext passwords to be recovered by password cracking group CynoSure Prime.[28]

Prevention

One method of preventing a password from being cracked is to ensure that attackers cannot get access even to the hashed password. For example, on the Unix operating system, hashed passwords were originally stored in a publicly accessible file /etc/passwd. On modern Unix (and similar) systems, on the other hand, they are stored in the shadow password file /etc/shadow, which is accessible only to programs running with enhanced privileges (i.e., "system" privileges). This makes it harder for a malicious user to obtain the hashed passwords in the first instance, however many collections of password hashes have been stolen despite such protection. And some common network protocols transmit passwords in cleartext or use weak challenge/response schemes.[29][30]

The use of salt, a random value unique to each password that is incorporated in the hashing, prevents multiple hashes from being attacked simultaneously and also prevents the creation of pre-computed dictionaries such as rainbow tables.

Another approach is to combine a site-specific secret key with the password hash, which prevents plaintext password recovery even if the hashed values are purloined. However privilege escalation attacks that can steal protected hash files may also expose the site secret. A third approach is to use key derivation functions that reduce the rate at which passwords can be guessed.[31]: 5.1.1.2 

Modern Unix Systems have replaced the traditional DES-based password hashing function crypt() with stronger methods such as crypt-SHA, bcrypt, and scrypt.[32] Other systems have also begun to adopt these methods. For instance, the Cisco IOS originally used a reversible Vigenère cipher to encrypt passwords, but now uses md5-crypt with a 24-bit salt when the "enable secret" command is used.[33] These newer methods use large salt values which prevent attackers from efficiently mounting offline attacks against multiple user accounts simultaneously. The algorithms are also much slower to execute which drastically increases the time required to mount a successful offline attack.[34]

Many hashes used for storing passwords, such as MD5 and the SHA family, are designed for fast computation with low memory requirements and efficient implementation in hardware. Multiple instances of these algorithms can be run in parallel on graphics processing units (GPUs), speeding cracking. As a result, fast hashes are ineffective in preventing password cracking, even with salt. Some key stretching algorithms, such as PBKDF2 and crypt-SHA iteratively calculate password hashes and can significantly reduce the rate at which passwords can be tested, if the iteration count is high enough. Other algorithms, such as scrypt are memory-hard, meaning they require relatively large amounts of memory in addition to time-consuming computation and are thus more difficult to crack using GPUs and custom integrated circuits.

In 2013 a long-term Password Hashing Competition was announced to choose a new, standard algorithm for password hashing,[35] with Argon2 chosen as the winner in 2015. Another algorithm, Balloon, is recommended by NIST.[36] Both algorithms are memory-hard.

Solutions like a security token give a formal proof answer[clarification needed] by constantly shifting password. Those solutions abruptly reduce the timeframe available for brute forcing (the attacker needs to break and use the password within a single shift) and they reduce the value of the stolen passwords because of its short time validity.

Software

There are many password cracking software tools, but the most popular[37] are Aircrack-ng, Cain & Abel, John the Ripper, Hashcat, Hydra, DaveGrohl, and ElcomSoft. Many litigation support software packages also include password cracking functionality. Most of these packages employ a mixture of cracking strategies; algorithms with brute-force and dictionary attacks proving to be the most productive.[38]

The increased availability of computing power and beginner friendly automated password cracking software for a number of protection schemes has allowed the activity to be taken up by script kiddies.[39]

See also

References

  1. ^ a b oclHashcat-lite – advanced password recovery. Hashcat.net. Retrieved on January 31, 2013.
  2. ^ Montoro, Massimiliano (2005). "Cain & Abel User Manual: Brute-Force Password Cracker". oxid.it (defunct). Archived from the original on June 7, 2019. Retrieved August 13, 2013.{{cite web}}: CS1 maint: unfit URL (link)
  3. ^ "What Is Password Spraying? How to Stop Password Spraying Attacks".
  4. ^ Bahadursingh, Roman (January 19, 2020). "A Distributed Algorithm for Brute Force Password Cracking on n Processors". doi:10.5281/zenodo.3612276. {{cite journal}}: Cite journal requires |journal= (help)
  5. ^ Lundin, Leigh (August 11, 2013). "PINs and Passwords, Part 2". SleuthSayers.org. Orlando.
  6. ^ Alexander, Steven. (June 20, 2012) The Bug Charmer: How long should passwords be?. Bugcharmer.blogspot.com. Retrieved on January 31, 2013.
  7. ^ Cryptohaze Blog: 154 Billion NTLM/sec on 10 hashes. Blog.cryptohaze.com (July 15, 2012). Retrieved on January 31, 2013.
  8. ^ John the Ripper benchmarks. openwall.info (March 30, 2010). Retrieved on January 31, 2013.
  9. ^ Burr, W E; Dodson, D F; Polk, W T (2006). Electronic authentication guideline (PDF) (Report). Gaithersburg, MD: National Institute of Standards and Technology. doi:10.6028/nist.sp.800-63v1.0.2.
  10. ^ "64-bit key project status". Distributed.net. Archived from the original on September 10, 2013. Retrieved March 27, 2008.
  11. ^ "Password Recovery Speed table". ElcomSoft. Archived from the original on February 21, 2011. Retrieved February 1, 2011.
  12. ^ "VCL Cluster Platform". mosix.cs.huji.ac.il.
  13. ^ "25-GPU cluster cracks every standard Windows password in <6 hours". 2012.
  14. ^ "EFF DES Cracker machine brings honesty to crypto debate". EFF. Archived from the original on January 1, 2010. Retrieved June 7, 2020.
  15. ^ Biddle, Sam (May 11, 2017). "NYU Accidentally Exposed Military Code-breaking Computer Project to Entire Internet". The Intercept.
  16. ^ "announce - [openwall-announce] John the Ripper 1.9.0-jumbo-1". openwall.com.
  17. ^ "Bcrypt password cracking extremely slow? Not if you are using". Medium. September 8, 2020.
  18. ^ Managing Network Security. Fred Cohen & Associates. All.net. Retrieved on January 31, 2013.
  19. ^ Yan, J.; Blackwell, A.; Anderson, R.; Grant, A. (2004). "Password Memorability and Security: Empirical Results" (PDF). IEEE Security & Privacy Magazine. 2 (5): 25. doi:10.1109/MSP.2004.81. S2CID 206485325.
  20. ^ a b Steinberg, Joseph (April 21, 2015). "New Technology Cracks 'Strong' Passwords – What You Need To Know". Forbes.
  21. ^ "CERT IN-98.03". Archived from the original on July 9, 2010. Retrieved September 9, 2009.
  22. ^ a b "Consumer Password Worst Practices" (PDF). Imperva.com.
  23. ^ "NATO Hack Attack". The Register. Retrieved July 24, 2011.
  24. ^ "Anonymous Leaks 90,000 Military Email Accounts in Latest Antisec Attack". July 11, 2011.
  25. ^ "Military Password Analysis". Imperva.com. July 12, 2011.
  26. ^ "Microsoft's Hotmail Bans 123456". Imperva.com. July 18, 2011. Archived from the original on March 27, 2012.
  27. ^ "Ashley Madison: Hackers Dump Stolen Dating Site Data". bankinfosecurity.com. Retrieved April 11, 2021.
  28. ^ "Researchers Crack 11 Million Ashley Madison Passwords". bankinfosecurity.com. Retrieved April 11, 2021.
  29. ^ Singer, Abe (November 2001). "No Plaintext Passwords" (PDF). Login. 26 (7): 83–91. Archived (PDF) from the original on September 24, 2006.
  30. ^ "Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol". Schneier.com. July 7, 2011. Retrieved January 31, 2013.
  31. ^ Grassi, Paul A (June 2017). "SP 800-63B-3 – Digital Identity Guidelines: Authentication and Lifecycle Management" (PDF). NIST. doi:10.6028/NIST.SP.800-63b. {{cite journal}}: Cite journal requires |journal= (help)
  32. ^ A Future-Adaptable Password Scheme. Usenix.org (March 13, 2002). Retrieved on January 31, 2013.
  33. ^ MDCrack FAQ 1.8. None. Retrieved on January 31, 2013.
  34. ^ Password Protection for Modern Operating Systems. Usenix.org. Retrieved on January 31, 2013.
  35. ^ "Password Hashing Competition". Archived from the original on September 2, 2013. Retrieved March 3, 2013.
  36. ^ "NIST SP800-63B Section 5.1.1.2" (PDF). nvlpubs.nist.gov.
  37. ^ "Top 10 Password Crackers". Sectools. Retrieved November 1, 2009.
  38. ^ "Stay Secure: See How Password Crackers Work - Keeper Blog". Keeper Security Blog - Cybersecurity News & Product Updates. September 28, 2016. Retrieved November 7, 2020.
  39. ^ Anderson, Nate (March 24, 2013). "How I became a password cracker: Cracking passwords is officially a "script kiddie" activity now". Ars Technica. Retrieved March 24, 2013.

Read other articles:

Artikel ini perlu diwikifikasi agar memenuhi standar kualitas Wikipedia. Anda dapat memberikan bantuan berupa penambahan pranala dalam, atau dengan merapikan tata letak dari artikel ini. Untuk keterangan lebih lanjut, klik [tampil] di bagian kanan. Mengganti markah HTML dengan markah wiki bila dimungkinkan. Tambahkan pranala wiki. Bila dirasa perlu, buatlah pautan ke artikel wiki lainnya dengan cara menambahkan [[ dan ]] pada kata yang bersangkutan (lihat WP:LINK untuk keterangan lebih lanjut). …

Artikel ini sebatang kara, artinya tidak ada artikel lain yang memiliki pranala balik ke halaman ini.Bantulah menambah pranala ke artikel ini dari artikel yang berhubungan atau coba peralatan pencari pranala.Tag ini diberikan pada Oktober 2016. Dalem Tawanan Djepang (judul lengkap: Dalem Tawanan Djepang: Boekit-Doeri, Serang, Tjimahi: penoetoeran pengidoepan interneeran pada djeman pendoedoekan Djepang) adalah sebuah judul buku yang ditulis oleh Nio Joe Lan. Buku ini ditulis berdasarkan pengalam…

Untuk kegunaan lain, lihat Sukiyaki (disambiguasi). Sukiyaki Sukiyaki (すき焼き, スキヤキcode: ja is deprecated ) adalah irisan tipis daging sapi, sayur-sayuran, dan tahu di dalam panci besi yang dimasak di atas meja makan dengan cara direbus. Sukiyaki dimakan dengan mencelup irisan daging ke dalam kocokan telur ayam. Sayur-sayuran untuk Sukiyaki misalnya bawang bombay, daun bawang, sawi putih, shungiku (nama daun dari pohon keluarga seruni), jamur shiitake, dan jamur enoki. Sebagai pele…

Spanish doctor This article is an orphan, as no other articles link to it. Please introduce links to this page from related articles; try the Find link tool for suggestions. (December 2021) Esteban Muruetagoiena ScolaBornEsteban Muruetagoiena Scola(1943-08-06)August 6, 1943Ondarroa (Basque Country)DiedMarch 28, 1982(1982-03-28) (aged 38)NationalityGipuzkoa (Basque Country)OccupationdoctorKnown fortorturee Esteban Muruetagoiena Scola (Ondárroa, Biscay, August 6, 1943 – Oyarzun, Guip…

Economic bubble in a stock market Part of a series onFinance Markets Assets Bond Commodity Derivatives Foreign exchange Money Over-the-counter Private equity Real estate Spot Stock Participants Investor institutional Retail Speculator Locations Financial centres Offshore financial centres Conduit and sink OFCs Instruments Bond Cash Collateralised debt obligation Credit default swap Time deposit (certificate of deposit) Credit line Deposit Derivative Futures contract Indemnity Insurance Letter of…

العلاقات النيجرية التنزانية النيجر تنزانيا   النيجر   تنزانيا تعديل مصدري - تعديل   العلاقات النيجرية التنزانية هي العلاقات الثنائية التي تجمع بين النيجر وتنزانيا.[1][2][3][4][5] مقارنة بين البلدين هذه مقارنة عامة ومرجعية للدولتين: وجه المقارنة …

Запрос «Еврейская община» перенаправляется сюда. На эту тему нужно создать отдельную статью. О стихотворении см. Евреи (стихотворение). Запрос «Еврей» перенаправляется сюда; также см. Еврей (газета). Евреи Современное самоназвание ивр. יהודים‎‎;идиш ייִדן/איד…

Seorang pendeta era Mississippi, dengan kapak runcing dan kepala manusia oleh Herb Roe, berdasarkan ilustrasi di lempeng tembaga. Pemburuan kepala adalah praktik pemenggalan kepala manusia dengan tujuan mendapat tengkoraknya. Pemburuan kepala pernah dipraktikkan di wilayah Tiongkok, India, Nigeria, Nuristan, Myanmar, Borneo (Indonesia & Malaysia) Filipina, Taiwan, Jepang, Mikronesia, Melanesia, Selandia Baru, dan Daerah Aliran Sungai Amazon, juga di Eropa kuno oleh suku-suku Kelt dan Skithia…

Neighbourhood-cum-Road in Kolkata, India Neighbourhood in Kolkata in West Bengal, IndiaPark StreetNeighbourhood in Kolkata (Calcutta)Park Street near Chowringhee Road crossingCountryIndiaStateWest BengalDistrictKolkataCityKolkataMetro StationPark StreetKMC wards61, 63, 64Government • BodyKolkata Municipal CorporationLanguages • OfficialBengali, EnglishTime zoneUTC+5:30 (IST)PIN700016, 700017Lok Sabha constituencyKolkata DakshinVidhan Sabha constituencyBhabanipur and Bally…

11th-century Anglo-Saxon noblewoman and figure of legend Godiva redirects here. For other uses, see Godiva (disambiguation). Lady Godiva by John Collier, c. 1897, in the Herbert Art Gallery and Museum, Coventry. Lady Godiva: Edmund Blair Leighton depicts her moment of decision (1892) Lady Godiva (/ɡəˈdaɪvə/; died between 1066 and 1086), in Old English Godgifu, was a late Anglo-Saxon noblewoman who is relatively well documented as the wife of Leofric, Earl of Mercia, and a patron of va…

Artikel ini berisi konten yang ditulis dengan gaya sebuah iklan. Bantulah memperbaiki artikel ini dengan menghapus konten yang dianggap sebagai spam dan pranala luar yang tidak sesuai, dan tambahkan konten ensiklopedis yang ditulis dari sudut pandang netral dan sesuai dengan kebijakan Wikipedia. Tenda Dibawah Bintang pada malam hari. Tenda Dibawah Bintang adalah tempat wisata outdoor di Bandung yang resmi dibuka pada tanggal 11 September 2020. Terletak di atas lahan seluas 2000 meter persegi, pe…

This article does not cite any sources. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Hanna-Barbera's All-Star Comedy Ice Revue – news · newspapers · books · scholar · JSTOR (August 2017) (Learn how and when to remove this message) American TV series or program Hanna-Barbera's All-Star Comedy Ice RevueGenreTelevision specialWritten byDick RobbinsDuane PooleJay Burto…

Duta Besar Mauritania untuk IndonesiaPetahanaWeddady Ould Sidi Haibasejak 2024Situs webambarimjakarta.org/en/ Berikut adalah daftar duta besar Republik Islam Mauritania untuk Republik Indonesia. Nama Kredensial Selesai tugas Ref. Yahya Ngam 4 Oktober 2016 [1][cat. 1] Mohammed At Thalib Zain Al Abidin 10 Juni 2020 [2] Houssein Sidi Abdellah 1 September 2021 [3] Weddady Ould Sidi Haiba 15 Februari 2024 Petahana [4] Catatan ^ Berkedudukan di Tokyo. Lihat…

Japanese politician (1931–2022) Toshiki Kaifu海部 俊樹Official portrait, 1989Prime Minister of JapanIn office10 August 1989 – 5 November 1991MonarchAkihitoPreceded bySōsuke UnoSucceeded byKiichi MiyazawaMember of the House of Representatives for Aichi 9th DistrictIn office20 November 1960 – 21 July 2009Succeeded byMitsunori OkamotoMinister of Finance[citation needed]In office14 October 1991 – 5 November 1991[citation needed]Preceded byRyuta…

Pour les articles homonymes, voir Charge. Dans une formulation, une charge est une substance solide, non miscible et dispersée par un moyen mécanique dans une matrice. Elle est introduite dans un mélange notamment pour en diminuer le coût, en améliorer certaines propriétés (par exemple le pouvoir couvrant, de réflexion ou d'adhésion d'une peinture) ou en modifier la densité. Son taux d'incorporation massique varie de quelques pourcents à plusieurs dizaines de pourcents (jusqu'à plus …

Krisis politik Ekuador 2023Lasso hadir di hadapan Majelis Nasional selama penyelidikan pemakzulannya pada 16 Mei 2023, sehari sebelum dia memohon muerte cruzadaTanggal17 – 24 Mei 2023LokasiEkuadorJenisKrisis parlemenPenyebabPresiden Guillermo Lasso memohon muerte cruzadaHasilPembubaran Majelis NasionalMemicu pemilihan umum 2023 Krisis politik Ekuador 2023 adalah krisis politik yang dimulai di Ekuador pada 17 Mei 2023 sebagai akibat dari sidang pemakzulan terhadap Presiden Guillermo Lasso. Peny…

Painting by Ambrogio Lorenzetti The Allegory of Good and Bad GovernmentItalian: Allegoria ed effetti del Buono e del Cattivo GovernoDetail of Allegory of Good GovernmentArtistAmbrogio LorenzettiYear1338MediumFrescoMovementGothic art, Sienese SchoolSubjectAllegorical depictions of good and bad governmentDimensions7.7 x 14.4m (room)[1]LocationPalazzo Pubblico, Siena, ItalyOwnerFondazione Musei Senesi The Bad Government on the left; The Good Government in the center The Allegory of Good and…

Radio station in Jacksonville, FloridaWCGLJacksonville, FloridaBroadcast areaJacksonville, FloridaFrequency1360 kHzBrandingVictory AM 1360ProgrammingFormatUrban gospelAffiliationsAmerican Urban Radio NetworksOwnershipOwnerJBD Communications, Inc.HistoryCall sign meaningWhere Christ Gets LiftedTechnical information[1]Licensing authorityFCCFacility ID30609ClassDPower5,000 watts (day)89 watts (night)Transmitter coordinates30°16′33.00″N 81°38′12.00″W / 30.…

Иерусалимский патриархатгреч. Πατριαρχείον Ιεροσολύμων араб. كَنِيسَة أُورُشَلِيمَ الأُرْثُوذُكسِيَّة‎ ивр. הכניסייה האורתודוקסית של ירושלים‎ Храм Гроба Господня, Иерусалим Общие сведения Основатели Апостолы (согласно церковному преданию) Основание I век Конфесс…

Neobatrachia Обыкновенная квакша Научная классификация Домен:ЭукариотыЦарство:ЖивотныеПодцарство:ЭуметазоиБез ранга:Двусторонне-симметричныеБез ранга:ВторичноротыеТип:ХордовыеПодтип:ПозвоночныеИнфратип:ЧелюстноротыеНадкласс:ЧетвероногиеКласс:ЗемноводныеПодкласс:Бес…

Kembali kehalaman sebelumnya