in reply to Re: Did Perlmonks Ever Salt and Hash Their Password Database?
in thread Did Perlmonks Ever Salt and Hash Their Password Database?

A recommendation: always pay attention to whether a site uses HTTPS or not; never, NEVER, NEVER reuse a password on a non-HTTPS site that you've used anywhere else.
Even HTTPS can be cracked in thirty seconds.

  • Comment on Re^2: Did Perlmonks Ever Salt and Hash Their Password Database?

Replies are listed 'Best First'.
Re^3: Did Perlmonks Ever Salt and Hash Their Password Database?
by choroba (Cardinal) on Aug 18, 2016 at 09:18 UTC
    > HTTPS can be cracked in thirty seconds

    Care to share the sources?

    ($q=q:Sq=~/;[c](.)(.)/;chr(-||-|5+lengthSq)`"S|oS2"`map{chr |+ord }map{substrSq`S_+|`|}3E|-|`7**2-3:)=~y+S|`+$1,++print+eval$q,q,a,
Re^3: Did Perlmonks Ever Salt and Hash Their Password Database?
by stevieb (Canon) on Aug 18, 2016 at 19:00 UTC

    Perhaps, but cracking SSL is significantly more complex than simply sniffing a wire for plaintext, or performing a MitM attack on a non-HTTPS connection.