Actually, I'd probably initialise the password (in the source) with a long hex string add a block of code that did some seriously complex bit-twiddling on it before its first use.
I'd then surround it with a big block comments saying that:
###################################################################
## This block must not be altered or copy&pasted in any way. ###
## It will no longer work if it is. ###
## If this needs to be updated, ###
## a new block must be obtained from the systems security team! ###
###################################################################
In any organisation, there has to be somebody who knows how things work!
Examine what is said, not who speaks.
"Efficiency is intelligent laziness." -David Dunham
"Think for yourself!" - Abigail
"Memory, processor, disk in that order on the hardware side. Algorithm, algorithm, algorithm on the code side." - tachyon
|