222w ago - Recently, through reconstructing the PS3 HDD, sonyk has added some new details to the PS3 HDD Map we posted early last year.
Normally the infoboard files reside in the flash, and although it's still missing the subdirecties of user (as well as data, drm, mms, and vsh), those interested can check out the partial user directory available below:
Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!
Oh, my. Just putting together some random crypto-related words won't make things miraculously happen. You're just mixing things to make it look you know what you're talking about.
CUDA has been used to accelerate bruteforcing some alogirthms used in WiFi security (there are implementations of SETI@Home, Folding@Home, video encryption, etc. using CUDA as well)
Rainbow tables are used to accelerate some operations used in breaking some encryptions. It itself is not a technique for breaking any cipher.
Some of the ciphers are still believed to be strong enough to withstand even attempts of FBI and the likes.
To effectively employ these techniques you need to know what you're trying to break (i.e. what is the cipher, mode, etc.)
Continuous file placement? If you mean that one file resides on a series of sectors without gaps that is a thing that no filesystem can guarantee without great performance penalty (just try to think about it a bit harder and you'll see why). That is why this usually doesn't work like this and if you want to to ensure it is so, you need to defragment from time to time.
Depending on the key type and length it may not take hundreds of years... the FBi and private organizations like Guidance Software use rainbow tables to hack even the hardest of encryption keys with "CUDA" google it we would have to get a driver for the rsx in linux to work or develop a program to do it more efficiently.. Plus my favorite Truecrypt isnt so secure anymore as well Google truecrypt security flaw. encryption can be defeated its how efficiently you can do it.. and at the present time it would be sloppy at best.
i was just curious on how the hard drive filsystem is layed out specifically i heard mention that there is no continuity to file placement? if the User content is available could $orny be using multiple file allocation methods to confuse pirates IE binary blobs instead of file headers?