passwords

How to continuously keep the number of bcrypt rounds relevant to the current year's hardware?

淺唱寂寞╮ 提交于 2019-12-04 00:59:20
问题 I saw a recommendation that the number of rounds be set to ($currentYear - 2000) to account for Moore's law, so that 2013 would be 13 rounds and therefore 2^13 total iterations. Of course, you need to take into account your own hardware to ensure it doesn't take too long (I saw 1 second recommended as "safe" for checking passwords/hashes, and 13 rounds falls around that mark on my current hardware). Does that sound reasonable for a social networking type of site? Or would I be setting myself

How does using a salt make a password more secure if it is stored in the database?

為{幸葍}努か 提交于 2019-12-04 00:24:54
I am learning Rails, at the moment, but the answer doesn't have to be Rails specific. So, as I understand it, a secure password system works like this: User creates password System encrypts password with an encryption algorithm (say SHA2). Store hash of encrypted password in database. Upon login attempt: User tries to login System creates hash of attempt with same encryption algorithm System compares hash of attempt with hash of password in the database. If match, they get let in. If not, they have to try again. As I understand it, this approach is subject to a rainbow attack — wherein the

Qt - Password field, warn about Caps-Lock

会有一股神秘感。 提交于 2019-12-04 00:15:02
Is there any Qt-built-in method to warn user (with pop-up window) that CapsLock is switched on while password field is active? I am currently using QLineEdit (is it good?) with setEchoMode(QLineEdit::Password) . once the user presses a key, you should check if the it's upper case AND if the shift is being held. if shift is not held,and the input is uppercase,caps lock is on. also if shift is down,and the input is lowercase,caps lock is on too. A post from Veronique Lefrere on the QT Interest mailing list has an answer, if you can wait for the user to press a key: wait for Qt::Key_CapsLock type

How do I make Git ask for a username and password every time I push?

寵の児 提交于 2019-12-03 23:49:13
问题 Where I work many people use the same computer on the same account. We now use the shell instead of the GUI just for convenience. The first time someone committed it asked for their username and password, but after that just used their account for all commits. I'm sorry that I don't know much about the shell, but this is the first time I'm using it. The commands I use to commit and synchronise are: git commit -a git push origin [branch name here] 回答1: It seems that users credentials are being

how to decrypt this password hash? [closed]

你。 提交于 2019-12-03 23:45:12
问题 This question is unlikely to help any future visitors; it is only relevant to a small geographic area, a specific moment in time, or an extraordinarily narrow situation that is not generally applicable to the worldwide audience of the internet. For help making this question more broadly applicable, visit the help center. Closed 6 years ago . i had googled a lot for decryption but it was useless can anyone please tell me which type of encryption is this and how to decrypt

How to validate password strength with Devise in Ruby on Rails?

好久不见. 提交于 2019-12-03 23:38:14
I want to force a user to choose a strong password on registration. I know, there are many jquery password strength meters out there, and I will most probably use one of them, too. But that does not really enforce anyone to choose a strong password. The registration form must also be useable without js enabled, so one could still potentially register with a weak password. Accounts must be most secure, because if you are logged in, you can see data of other accounts, which I do not want exposed under any circumstances. So I want to go for maximum security here, therefore I think, it is most

How to store passwords offline

时光毁灭记忆、已成空白 提交于 2019-12-03 22:13:59
Although this is focused on Windows Phone 7, I guess the principle is universal. I would like to have a password protected zone within my app. However, my application is completely offline and so I will have to store credential details on the phone. My initial idea is to store a hash of the password and the salt. Would this be the best way to go? If so, should the hash and salt be stored in plain text, or is there a way to ensure that even they are encrypted? I understand that having the entire scheme on the phone will eventually be cracked, but what would be the best way to raise the barrier?

Simple password encryption - how do i do? [closed]

半城伤御伤魂 提交于 2019-12-03 22:01:21
How do I make a simple password encryption to go into a database please? I need this to keep my job! Basially I need the code to do something like: EDIT I have a MySQL Table called "Usernames" on my local PC. It has the following columns: ID Username Password Account Type This table is used to log into the application, and I am in need of a secure way of storing the password. Can anyone help? In future, I'd suggest you refrain from begging for answers without first showing some code you've tried. That being said, I'll bite. import java.security.MessageDigest; import java.security

storing credentials in android

試著忘記壹切 提交于 2019-12-03 21:59:41
how should i store user credentials in my app i'm creating for myself? i'm not setting up any servers i'm just installing the app directly to my phone via USB. what i'm trying to do is have myself enter a username/password to associate to the account, basically the same as most other apps. the only difference is i'm not setting up any servers since i'm new and would have no idea how to do that. so with this in mind could i get away with storing in a database and pulling the info from there, or, as i'm sure of, is there an easier way to do this provided by android? note: i am very new and am

is hashing mechanism really secure?

Deadly 提交于 2019-12-03 21:58:00
Well, I have always seen (and following) people saying to use hashing mechanism for storing passwords in database. I am really concerned is it secure? Lets go with example. Let's say I am hacker and I got your database name, id and password. Now I have FULL access to your database. What people say passwords should be hashed because if someone hacks, they are visible to hackers. so If I run query as select id, password FROM userDetails I will get data as below Option 1 : Without hash ++++++++++++++++++++++++++++ + id + password + ++++++++++++++++++++++++++++ + id01 + password01 + + id02 +