11/29/2019 – A good password paired with strong encryption protects data against unexpected loss. No password is unbreakable, but some can last for quote a long time. After 39 years, recently a few old Unix passwords were cracked. Computer pioneer Ken Thompson had hidden his access behind a chess opening. | Photo: Bell Labs
Your personal chess trainer. Your toughest opponent. Your strongest ally. FRITZ 20 is more than just a chess engine – it is a training revolution for ambitious players and professionals. Whether you are taking your first steps into the world of serious chess training, or already playing at tournament level, FRITZ 20 will help you train more efficiently, intelligently and individually than ever before.
Perfect endgame analysis and a huge increase in engine performance: Get it with the new Endgame Turbo 5! This brings the full 6-piece Syzygy endgame tablebases on a pendrive. Just plug it in a USB socket and you are set!
Become a master of chess strategy – get Robert Ris’s complete bundle now at a special price!
€99.90
Pawn to queen four
Ken Thompson is one of the heroes of computer history. He worked at Bell Labs most of his life, was co-inventor of the Unix operating system, developed the programming language "B", a precursor to the current "C" language, and several other important things in computer history. Later he brought his knowledge to Google.
Thompson did great things for chess as well. Together with Joe Condon, he developed the chess computer Belle, who became chess computer world champion in 1980. Many years ago, Thompson had the idea to calculate endgames with limited numbers of pieces and compile them in a database. The first "tablebases", as they became known, with three, four and five pieces came from Ken Thompson. Others continued his idea later with newer computers and more pieces. The concept is in use today in all chess programs.
The most popular chess program offers you everything you will need as a dedicated chess enthusiast, with innovative training methods for amateurs and professionals alike.
A few years ago, an encrypted file with the old passwords of computer old-timers like Ken Thompson, Dennis Ritchie, Stephen R. Bourne and Eric Schmidt was found by chance. Leah Neukirchen (see below) had the idea to crack the old passwords that used antiquated encryption with new techniques — which proved to be possible reasonably fast. Only Ken Thompson's password resisted. With the help of a colleague, Nigel Williams, it too could eventually be cracked.
The password included the sequence p/q2-q4!
What looks reasonably cryptic to everyone else is an easy-to-remember string for chess players. the password means Pawn (Pawn) Queen 2 - Queen 4 (d2-d4). Not a bad password for a chess fan.
For cracking Ken Thompson's chess opening password, Nigel Williams needed four days use his modern tools. Boris Grishenko, an antagonist of James Bond in "Golden Eye" (1995), of course, would have done much faster, even to impress his charming colleague Natalya Simonova. Here we see him at work.
Alan Cumming opposite Izabella Scorupco in the 1995 Bond film Golden Eye
2nd Move Anti-Sicilian Powerbase 2025 is a database and contains a total of 12090 games from Mega 2025 or the Correspondence Database 2024, of which 874 are annotated.
Ruy Lopez Powerbase 2025 is a database and contains a total of 12092 games from Mega 2025 and the Correspondence Database 2024, of which 1276 are annotated.
In this 60 Minutes, Andrew Martin guides you through all the key ideas you need to know to play with confidence. Whether you’re looking to surprise your opponents, or simply want a straightforward weapon against e5, the Centre Attack has you covered.
€9.90
We use cookies and comparable technologies to provide certain functions, to improve the user experience and to offer interest-oriented content. Depending on their intended use, analysis cookies and marketing cookies may be used in addition to technically required cookies. Here you can make detailed settings or revoke your consent (if necessary partially) with effect for the future. Further information can be found in our data protection declaration.
Pop-up for detailed settings
We use cookies and comparable technologies to provide certain functions, to improve the user experience and to offer interest-oriented content. Depending on their intended use, cookies may be used in addition to technically required cookies, analysis cookies and marketing cookies. You can decide which cookies to use by selecting the appropriate options below. Please note that your selection may affect the functionality of the service. Further information can be found in our privacy policy.
Technically required cookies
Technically required cookies: so that you can navigate and use the basic functions and store preferences.
Analysis Cookies
To help us determine how visitors interact with our website to improve the user experience.
Marketing-Cookies
To help us offer and evaluate relevant content and interesting and appropriate advertisement.