The University of Texas at Dallas
If research is something you want to do, then just do it. Don’t let any reservations hold you back. At the end of the day, it’s about you and what it is that makes you happy. Give research a try. You might like it and you might not. If you don’t, you can always take a different path, but research is a great place to start. If gives you a lot of experience to take with you within the industry. You will obtain a lot of lab and writing experience. At the very least, research will give you the building blocks to get somewhere else, but it’s always worth a shot.
Use the links below to see the corresponding essay topic
Additional situations requiring application for transfer. UT Austin graduate students who are interested in taking undergraduate courses but who have never attended UT Austin as an undergraduate must apply for undergraduate transfer admission. The same is true for students who have taken only correspondence or extension courses at UT Austin as well as students who have taken only summer courses when enrolled as a transient student.
Select the image below to enlarge it.
Password crackers can try a lot more than 8 million guesses per second for most formats (e.g. MD5, SHA, NT Hash, LANMAN). I don't know where the 8M in that article came from, but the screenshot shows four GPUs collectively trying 656M+ guesses per second.
How to determine the current application status
*you have a chance that they will recover the database and not the key, but you should not rely on it. See the Adobe leak as an example for both cases.
If Program Action = Application:
The basic idea being that you basically accept that you can't force users to choose strong passwords, but at least eliminate the really weak passwords, allow those people who would choose stronger passwords to do so, and increase the possibilities to slow down an attacker who tries to crack your entire database. Combining with a salted, slow hash function, possibly with a secret key* should also be considered essential.