Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

Yo!

Name: Anonymous 2010-05-08 4:57

So if the computer recognizes my password it has to be stored somewhere on it, right?
So where is it stored?

Name: Anonymous 2010-05-08 5:01

No, no, no.

This thread is already here.

Name: Anonymous 2010-05-08 6:18

sage

Name: Anonymous 2010-05-08 8:38

It's protected using the MD5 protocol

Name: Anonymous 2010-05-08 9:07

* SHA512

Name: Anonymous 2010-05-08 10:02

*crypt

Name: Anonymous 2010-05-08 10:20

*ROT

Name: Anonymous 2010-05-08 12:44

* double XOR

Name: Anonymous 2010-05-08 12:56

>>8
DOUBLE XOR MYANUS

Name: Anonymous 2010-05-08 16:34

Go back to /g/ please...

Name: Anonymous 2010-05-08 19:00

The question is not specific enough to have a real answer.
You would have to describe "the computer recognizes my password" in excrutiating detail.

Name: Anonymous 2013-01-19 0:18

/prog/ will be spammed continuously until further notice. we apologize for any inconvenience this may cause.

Name: Anonymous 2013-01-19 0:53

BIOS password? on the ROM
OS user passwprd? on the OS's user db.
Most OS use /etc/passwd
man passwd

Name: Anonymous 2013-01-19 1:31

>>1 not exactly, but kind of.
The main idea is a zero-knowledge-proof, (aka) a one-way-encryption, or cryptographic hash function. kind of like the examples #4-8 mentioned. (sort of)
So the idea is that it is easy to encrypt the password, say "password" gets turned to "0a976b832f...", but as difficult as possible to decrypt it back to what it was. And then an attacker will end up just having to try encrypting lots of possible passwords, and looking for one that matches the proof.
These aren't fool-proof, and there are ways to both 'crack' them (remote-style attacks, usually when you want to undo the encryption / recover the password) and/or wipe them (physical access/ boot into another OS and just wipe them out)

Don't change these.
Name: Email:
Entire Thread Thread List