![]() ![]() In the next part of this article, I’m going to show you how hackers “decrypt” hashed password to the actual word (Well, they don’t actually decrypt, they guess). ![]() They can’t just copy your gibberish password and paste it into the login page because the algorithm will make a gibberish out of the gibberish word. ![]() In the event a hacker flirts with your database administrator and gains access to the database, all he’ll see is just the gibberish stuff. Responsible companies hash your passwords. They take the password you type into their sign-up page, make it gibberish, then store those gibberish words into their database. Plain text (Can you hear me shaking my head?).The difference is encryption is reversible, while hashing is (almost) irreversible. □ JARGON ALERT: Encryption and hashing are similar they make words become gibberish. The message makes sense to both of you, but appears as gibberish to the people in between. In response, you probably established some kind of code between you and your crush beforehand. And friends are the worst you could never trust them with your secret message. Remember the good old days when you were passing love notes to your crush across the classroom?Ĭhances are you had to pass that note to your friend > another friend > and another friend before it reaches your crush. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |