Do you have to wear a helmet on the minibus Shane? Is it a yellow minibus?
Announcement
Collapse
No announcement yet.
The Banter Thread / Banter Topic / Sean Bean
Collapse
This topic is closed.
X
X
-
Originally posted by kernow View PostI see people running in the morning at 6AM in the rain, I mean, how do people do it, I know its nice to have a trim bod and all, and I'm not fat by any means, just a little .. uh.. wobbly, do they REALLY need to do it in the rain at 6AM? Sometimes I feel like shouting "WHERE DO YOU GOOOOO?" angrily like my mate did at old people in their cars at 11:30PM.
Now tell me why you're out at 6am. You don't even like your job, why do you get up at such a ridiculous time? See those people out running at 6am? Ok they're a bit mad, but they're doing something they like. If they decide not to they can sleep in until 7 or 8am. Who's the mad one now?
Comment
-
Originally posted by Rossco View PostI said well its just for security reasons blah blah, and he goes "Well I work in computing and I know that whether your password is 1 or 101 digits, it'll take the same time for someone to hack it" and I just laughed him off like "oh right.... yeh!?"
Some people!
But what he may have meant is that many password systems create a "hash" of the password (which is a number) and then check the number against the number stored in the database for that user. As the hash is unique (in theory, the hashing algorithm guarantees this, but it's possibly, statistically not true in all cases) it means system never has to store the user's password in it's database, just the hash, so nobody could ever hack the db and find out the user's password.
In some systems (I'm thinking old Novell networks), intercepting the password between the users system and the password protected system is not possible because the actual password isn't transmitted, just the hash. As the hashing process is a one way algorithm, if you capture the hash, you are no nearer obtaining the password.
However, in these cases because the password is reduced to a number, it doesn't matter how long the password is, thus hacking a 101 character password and a 1 character password is actually the same effort.
Comment
-
Originally posted by gunrock View PostWell, actually that depends. If someone is trying to dictionary hack i.e trying lots of lots of words/phrases from a file, then a longer, non-repeating password will slow them down.
But what he may have meant is that many password systems create a "hash" of the password (which is a number) and then check the number against the number stored in the database for that user. As the hash is unique (in theory, the hashing algorithm guarantees this, but it's possibly, statistically not true in all cases) it means system never has to store the user's password in it's database, just the hash, so nobody could ever hack the db and find out the user's password.
In some systems (I'm thinking old Novell networks), intercepting the password between the users system and the password protected system is not possible because the actual password isn't transmitted, just the hash. As the hashing process is a one way algorithm, if you capture the hash, you are no nearer obtaining the password.
However, in these cases because the password is reduced to a number, it doesn't matter how long the password is, thus hacking a 101 character password and a 1 character password is actually the same effort.
I've seen you on BBC2 on Sunday mornings!Kept you waiting, huh?
Comment
Comment