Ask, I if this transcoding, is not security will be a little higher.
For example: SHA1 (MD5 ("password"))
What I want to know is:
1 is that necessary?
2 If this is possible, the impact on performance will be very large
or other what I can not think
Atitit. Secure Signature Algorithm Attilax Summary1. MD5 (not recommended) The result is a 128-bit binary, only a 16 binary string is 32 bits 12. the length of the cipher string after encryption using the SHA1 algorithm is a bit more secure. SHA2 1
It is of great significance to study the encryption and decryption of MySQL database in the course of network attack and defense. Imagine that once you have access to the site's permissions, if you can get the data stored in MySQL, through the
The MYSQL Database User Password is the same as the password of other database users. It appears in plain text in the application system code. After obtaining the file read permission, it can be directly read from the database connection file, for
The industry's biggest surprise was the intrusion of RSA, which directly led to a chain of attacks by several industrial giants, and many security companies themselves using RSA's tokens. The Dutch electronics certification company DigiNotar, which
In. net, many shared software on the Internet began to be written in. net. Cracker should keep pace with the times, at leastYou must be able to deal with simple. net software! You have seen GREENLEMON (Bodhi !) [FCG] It has benefited a lot from
At the beginning of this year, a well-known cloud recording software vendor reported that data was stolen, forcing the company to reset the password of 50 million users and urgently notifying users to set a new password. Subsequently, the company
Update #2: This article has been updated over at http://retrorabble.wordpress.com/2013/10/12/cracking-cisco-password-hashes-part-2/
UPDATE: See bottom of post for a way to run MD5 cracking on Linux
Well, I managed to find this information out by
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.