Account Password Security
|
FUCK YOU CHRIS WILSON!! YOUR GAME IS FUCKING AWESOME!! I'M GONNA DIE!!!!
Last edited by choy1026#1578 on Nov 19, 2012, 9:11:15 AM
|
|
" Haha... awesome? I'm confused. Join the Veterans of War! See the thread in Off-topic for details.
|
|
|
I'm pretty sure I need to go through all my accounts and change my pass. This is of course just an example, but would this work as a password? AbunnycanBaCat,ifuwant2callitth@
I know that wouldn't obviously work for all sites, but I'll have to figure something else out later on for those sites. |
|
" You have a misconception there. The way crypt() operates is that it takes an input string, as well as a salt string to produce its output. However, it only takes a fixed amount of bytes from the beginning of the salt string (in a special format depending on the algorithm) and discards the rest. In order to validate a password, the entire input string, as well as the first few bytes of the salt string must be identical to when the hash has been stored in the database. When the hash is originally being created, a random salt is being used, and the output has is being stored in the database. The "input valid" condition is therefore crypt($user_input, $original_salt) == $hashed_password_from_database Since the user that is attempting a login only provides the input string and not the random salt that was generated earlier, there must be a way to retrieve the original salt. To make this possible, crypt() puts the originally used salt directly at the beginning of its output, which is then stored on the database. That way the input string can be combined with the salt from the database, and if the result is equal to the entire output string in the database, the password was valid. Practically, because the salt is stored in the algorithm's corresponding salt format at the beginning of the hashed password in the database, the "input valid" condition becomes crypt($user_input, $hash_from_db) == $hash_from_db Using hashes with salting does not make it more or less difficult for a cracker to use a brute force or dictionary attack to retrieve a password. The only point of salting is to make rainbow tables less efficient. That means salting only helps if GGG's database itself would have been compromised, and intruders had access to the hashed passwords. In order to do something with the passwords at this point, they would have to "unhash" the passwords first. I could write a few more paragraphs on that topic, but the message is basically just that salting makes the process significantly harder. Last edited by dialer#1061 on Dec 13, 2012, 12:49:39 PM
|
|
|
I would vote for a Authenticator To figur them out the hackers need to know the first new number from wen you last logged in so i let 1 or 2 pass before i write the 3rd one in to mainly logg in that way they cant figur them out if they havent stole my phone will say. And i have tried the math thingy to hack a authenticator and it takes 1-2 tries to get it right maybe just me but with this thing i do they just cant get the numbers right and yea maybe your account will be blocked wen ur going to logg in but then you know someones at our computer and then its time to search it for odd files and make your virus program work. often a key logger who lies in some map you downloaded for mods or anything else for other games or just som duch friend who tries to fuck with you ^^ (i actuly did take a usb stick and put a key logger to a friends computer to test this out) well he wasent a fan of it but i gave everything back and more for the damage done :) it was only for a test of my accounts safety and it seems to work fine.
To Glory and Beyond! RippsaN out!.
Check out my Threads! -Farming system and Drops? -PoE or D3? -Beta invite timer thing. -Class system. |
|
" authenticators cost a lot of money to get and implement even with Google authenticator. |
|
|
This all seems superfluous, because one of the salient differences between the LoL community and PoE is that we are alot smaller. And hackers usually have a predilection of targeting larger communities.
But if someone connived to hack our passwords, I'm sure the knowledgeable people here could be able to inhibit it from doing any actual damage. Or maybe I'm wrong and I need to be shaken out of my complacency. |
|
|
Also for your security question, never answer them logically.
Bad Example) Q: What was you first dog's name A: Bob Good Exapmle) Q: What was you first dog's name A: CheeseBurgersTasteGood |
|
" Or mix the answers around. Alot of people I know do that for sites. MCAussie MCServer. MCWin.
|
|
" LOL. Interesting idea, except for I'd never remember something like that. Basically, to me, that's like having another password, but you're now being asked this because you forgot your first password. Although, I guess if you use the same string for ANY question and keep using it, then it would make sense. Knowing me, I'd still $*& forget it lol. Different strokes for different folks, I guess :) |
|













