But have you ever noticed that it's not an HTTPS connection? That means that when you type your password in and hit LOGIN, your password is sent unencrypted across the net. No matter how securely the password is stored on the server, it's a trivial matter for the black hat to intercept your password on its way there.
A recommendation: always pay attention to whether a site uses HTTPS or not; never, NEVER, NEVER reuse a password on a non-HTTPS site that you've used anywhere else.
A further recommendation: never reuse a password. Period. Almost never use a password that's possible to remember. Use a password manager to store all your passwords. The one password you need to be able to remember: the one to get into your password manager; make it something you'll never forget, you'll never use anywhere else, and very secure.
In reply to Re: Did Perlmonks Ever Salt and Hash Their Password Database?
by pryrt
in thread Did Perlmonks Ever Salt and Hash Their Password Database?
by reisinge
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |