miata.net hacked?
#21
Boost Pope
iTrader: (8)
Join Date: Sep 2005
Location: Chicago. (The less-murder part.)
Posts: 33,046
Total Cats: 6,607
Sober as a judge. Just exhausted from 12 hour days filled with proposals and capital requisitions and staff meetings.
In all seriousness, I know this will sound absurd to people whose work history to date has not included upper management roles, but being the boss sucks quite a lot of the time.
In all seriousness, I know this will sound absurd to people whose work history to date has not included upper management roles, but being the boss sucks quite a lot of the time.
#24
Sober as a judge. Just exhausted from 12 hour days filled with proposals and capital requisitions and staff meetings.
In all seriousness, I know this will sound absurd to people whose work history to date has not included upper management roles, but being the boss sucks quite a lot of the time.
In all seriousness, I know this will sound absurd to people whose work history to date has not included upper management roles, but being the boss sucks quite a lot of the time.
#26
Encryption terms.
https://en.wikipedia.org/wiki/Salt_(cryptography)
In cryptography, a salt is random data that is used as an additional input to a one-way function that "hashes" a password or passphrase. Salts are closely related to the concept of nonce. The primary function of salts is to defend against dictionary attacks or against its hashed equivalent, a pre-computed rainbow table attack.
A new salt is randomly generated for each password. In a typical setting, the salt and the password (or its version after Key stretching) are concatenated and processed with a cryptographic hash function, and the resulting output (but not the original password) is stored with the salt in a database. Hashing allows for later authentication without keeping and therefore risking the plaintext password in the event that the authentication data store is compromised.
Since salts do not have to be memorized by humans they can make the size of the rainbow table required for a successful attack prohibitively large without placing a burden on the users. Since salts are different in each case, they also protect commonly used passwords, or those who use the same password on several sites, by making all salted hash instances for the same password different from each other.
Cryptographic salts are broadly used in many modern computer systems, from Unix system credentials to Internet security.
A new salt is randomly generated for each password. In a typical setting, the salt and the password (or its version after Key stretching) are concatenated and processed with a cryptographic hash function, and the resulting output (but not the original password) is stored with the salt in a database. Hashing allows for later authentication without keeping and therefore risking the plaintext password in the event that the authentication data store is compromised.
Since salts do not have to be memorized by humans they can make the size of the rainbow table required for a successful attack prohibitively large without placing a burden on the users. Since salts are different in each case, they also protect commonly used passwords, or those who use the same password on several sites, by making all salted hash instances for the same password different from each other.
Cryptographic salts are broadly used in many modern computer systems, from Unix system credentials to Internet security.
#27
Elite Member
iTrader: (21)
Join Date: Jun 2007
Location: Rochester, NY
Posts: 6,597
Total Cats: 1,263
Thanks for posting; I read that after I posted. Learned way more than I ever wanted to about encryption and passwords.
I actually thought the "salted and hashed" was a method the hackers used to break in.
I actually thought the "salted and hashed" was a method the hackers used to break in.
Thread
Thread Starter
Forum
Replies
Last Post