.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: devcode on October 15, 2007, 08:46 AM
Sorry, I have decided to go solo on the project at this current time.
Quote from: Newby on August 18, 2007, 11:20 AM
Password recovery. Try it.
Quote from: Ersan on March 25, 2007, 07:15 AMQuote from: Banana fanna fo fanna on March 16, 2007, 07:56 PM
and store that string in the database
Quote from: Banana fanna fo fanna on March 16, 2007, 07:56 PM
Just because you hashed the password in the database doesn't mean it isn't vulnerable to common password attacks. Lots of times, if your database gets hijacked, one can precompute the hashes of many common passwords and bruteforce them. Use a salted SHA-1 to reduce these attacks (essentially append a random string at the end of the password before hashing it, and store that string in the database).
Quote from: [RealityRipple] on March 23, 2007, 11:00 PM
Guys, guys. This is a markup language, not a programming language. I for one think web applications should be designed in markup languages. Let real software be written in a real programming language. This is all fancy stuff, not true programming, and anyone who knows anything about programming knows that. But that doesn't mean it's not cool!
Quote from: Warrior on March 22, 2007, 03:43 PM
What's really new with this? Looks like they mash up a bunch of existing technologies. Looks like it'd be slow as hell as well.Quote
more of a step backwards in performance and resource consumption (which is where application development has been headed for the past couple years with .NET) - but that's just my opinion.
You're still ranting on on something you can't even prove? Why are you trolling?
Quote from: Ersan on March 18, 2007, 06:50 AM
A salted md5 or (if you must) sha1 hash is more than adequate... Salting renders rainbow attacks innefective. If someone's gained access to your database you probably have more important things to worry about than stolen passwords that will take ages to bruteforce.
Page created in 0.078 seconds with 11 queries.