I am not new to Linux, or Debian but I have been working within Kali just to learn how to crack a password from an old HD of mine that I have forgotten the Password of to recover a few lost files. John the ripper finds 2 but leaves me hanging forever searching and finding the 3td as it says. I am running a pretty standard machine here with a A-10 chip and an additional Plugin small
msi R7 240 Graphics card.
Below is the listing of the CPU chip mounted on my MB.

Code:
david-ub@davidub:~$ lscpu
Architecture:                    x86_64
CPU op-mode(s):                  32-bit, 64-bit
Byte Order:                      Little Endian
Address sizes:                   48 bits physical, 48 bits virtual
CPU(s):                          4
On-line CPU(s) list:             0-3
Thread(s) per core:              2
Core(s) per socket:              2
Socket(s):                       1
NUMA node(s):                    1
Vendor ID:                       AuthenticAMD
CPU family:                      21
Model:                           56
Model name:                      AMD A10-7860K Radeon R7, 12 Compute Cores 4C+8G
Stepping:                        1
Frequency boost:                 enabled
CPU MHz:                         1934.491
CPU max MHz:                     3600.0000
CPU min MHz:                     1400.0000
BogoMIPS:                        7186.72
Virtualization:                  AMD-V
L1d cache:                       32 KiB
L1i cache:                       192 KiB
L2 cache:                        4 MiB
NUMA node0 CPU(s):               0-3
Vulnerability Itlb multihit:     Not affected
Vulnerability L1tf:              Not affected
Vulnerability Mds:               Not affected
Vulnerability Meltdown:          Not affected
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled v
                                 ia prctl and seccomp
Vulnerability Spectre v1:        Mitigation; usercopy/swapgs barriers and __user
                                  pointer sanitization
Vulnerability Spectre v2:        Mitigation; Full AMD retpoline, STIBP disabled,
                                  RSB filling
Vulnerability Srbds:             Not affected
Vulnerability Tsx async abort:   Not affected
Flags:                           fpu vme de pse tsc msr pae mce cx8 apic sep mtr
                                 r pge mca cmov pat pse36 clflush mmx fxsr sse s
                                 se2 ht syscall nx mmxext fxsr_opt pdpe1gb rdtsc
                                 p lm constant_tsc rep_good nopl nonstop_tsc cpu
                                 id extd_apicid aperfmperf pni pclmulqdq monitor
                                  ssse3 fma cx16 sse4_1 sse4_2 popcnt aes xsave 
                                 avx f16c lahf_lm cmp_legacy svm extapic cr8_leg
                                 acy abm sse4a misalignsse 3dnowprefetch osvw ib
                                 s xop skinit wdt lwp fma4 tce nodeid_msr tbm to
                                 poext perfctr_core perfctr_nb bpext ptsc cpb hw
                                 _pstate ssbd vmmcall fsgsbase bmi1 xsaveopt ara
                                 t npt lbrv svm_lock nrip_save tsc_scale vmcb_cl
                                 ean flushbyasid decodeassists pausefilter pfthr
                                 eshold overflow_recov
I might not have enough graphics power to break my password faster. I have played with John many times to let you know so I do know most commands. I read alot about how important cuda cores are on pentesting. What is the average
cuda core count
needed to do things in a timely manner?
Thank You