Provided one uses a strong enough hash algorithim (at least SHA1) can anyone find vulnerabilities in this method of managing passwords?
Neil Watson
watson-wilson.ca
In reply to Password management. Seeking crypto advice by neilwatson
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |