Miata Turbo Forum - Boost cars, acquire cats.

Miata Turbo Forum - Boost cars, acquire cats. (https://www.miataturbo.net/)
-   Insert BS here (https://www.miataturbo.net/insert-bs-here-4/)
-   -   miata.net hacked? (https://www.miataturbo.net/insert-bs-here-4/miata-net-hacked-90484/)

Joe Perez 09-13-2016 10:25 PM

Sober as a judge. Just exhausted from 12 hour days filled with proposals and capital requisitions and staff meetings.

In all seriousness, I know this will sound absurd to people whose work history to date has not included upper management roles, but being the boss sucks quite a lot of the time.

aidandj 09-13-2016 10:26 PM

I've seen my managers schedule.

I'm amazed he gets anything done besides going to meetings.

RalliartRsX 09-13-2016 11:45 PM

I got an email...........but I though this hack took place in February of this year??

z31maniac 09-14-2016 08:22 AM


Originally Posted by Joe Perez (Post 1360749)
Sober as a judge. Just exhausted from 12 hour days filled with proposals and capital requisitions and staff meetings.

In all seriousness, I know this will sound absurd to people whose work history to date has not included upper management roles, but being the boss sucks quite a lot of the time.

Never been in upper management but I know what the schedules are like. I'm perfectly happy to not be the boss and be the only one in the company that does my job and knows to use my publishing software.

psyber_0ptix 09-14-2016 08:37 AM


Originally Posted by Stealth97 (Post 1360729)
Credentails ain't gonna get cracked without AMAZON levels of compute power for a LONG time

:3

Girz0r 09-14-2016 09:31 AM


Originally Posted by rleete (Post 1360726)
English translation?

https://pioneerwoman.files.wordpress...browns-13.jpg?

Encryption terms.

https://en.wikipedia.org/wiki/Salt_(cryptography)


In cryptography, a salt is random data that is used as an additional input to a one-way function that "hashes" a password or passphrase. Salts are closely related to the concept of nonce. The primary function of salts is to defend against dictionary attacks or against its hashed equivalent, a pre-computed rainbow table attack.

A new salt is randomly generated for each password. In a typical setting, the salt and the password (or its version after Key stretching) are concatenated and processed with a cryptographic hash function, and the resulting output (but not the original password) is stored with the salt in a database. Hashing allows for later authentication without keeping and therefore risking the plaintext password in the event that the authentication data store is compromised.

Since salts do not have to be memorized by humans they can make the size of the rainbow table required for a successful attack prohibitively large without placing a burden on the users. Since salts are different in each case, they also protect commonly used passwords, or those who use the same password on several sites, by making all salted hash instances for the same password different from each other.

Cryptographic salts are broadly used in many modern computer systems, from Unix system credentials to Internet security.

rleete 09-14-2016 12:07 PM

Thanks for posting; I read that after I posted. Learned way more than I ever wanted to about encryption and passwords.

I actually thought the "salted and hashed" was a method the hackers used to break in.


All times are GMT -4. The time now is 06:59 AM.


© 2024 MH Sub I, LLC dba Internet Brands