2x2630lv3_john-the-ripper-1.7.2
2 x Intel Xeon E5-2630L v3 testing with a ASUS Z10PA-D8 (3201 BIOS) and ASPEED (WDDM) on Microsoft Windows 10 Pro Build 19041 via the Phoronix Test Suite.
2x2630lv3_john-the-ripper-1.7.2
Processor: 2 x Intel Xeon E5-2630L v3 @ 1.80GHz (16 Cores / 32 Threads), Motherboard: ASUS Z10PA-D8 (3201 BIOS), Memory: 4 x 16384 MB 1866MHz Micron 36ASF2G72PZ-2G1A2, Disk: 119GB SAMSUNG SSD PM871 2.5 7mm 128GB + 447GB Force MP510 + 0GB AMI Virtual HDisk2 USB + 0GB AMI Virtual HDisk1 USB + 0GB AMI Virtual HDisk0 USB, Graphics: ASPEED (WDDM), Network: Intel I210 Gigabit Connection
OS: Microsoft Windows 10 Pro Build 19041, Kernel: 10.0 (x86_64), Display Driver: 9.0.10.106, File-System: NTFS, Screen Resolution: 1920x1080
Security Notes: __user pointer sanitization: Disabled + Retpoline: Full + IBPB: Always + IBRS: Enabled + STIBP: Enabled + KPTI Enabled: Yes + PTE Inversion: Yes
John The Ripper
This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.
2x2630lv3_john-the-ripper-1.7.2
Processor: 2 x Intel Xeon E5-2630L v3 @ 1.80GHz (16 Cores / 32 Threads), Motherboard: ASUS Z10PA-D8 (3201 BIOS), Memory: 4 x 16384 MB 1866MHz Micron 36ASF2G72PZ-2G1A2, Disk: 119GB SAMSUNG SSD PM871 2.5 7mm 128GB + 447GB Force MP510 + 0GB AMI Virtual HDisk2 USB + 0GB AMI Virtual HDisk1 USB + 0GB AMI Virtual HDisk0 USB, Graphics: ASPEED (WDDM), Network: Intel I210 Gigabit Connection
OS: Microsoft Windows 10 Pro Build 19041, Kernel: 10.0 (x86_64), Display Driver: 9.0.10.106, File-System: NTFS, Screen Resolution: 1920x1080
Security Notes: __user pointer sanitization: Disabled + Retpoline: Full + IBPB: Always + IBRS: Enabled + STIBP: Enabled + KPTI Enabled: Yes + PTE Inversion: Yes
Testing initiated at 7 July 2020 18:10 by user Test.