On Tuesday 13 August 2002 01:01 pm, you wrote:
> On Wed, Aug 14, 2002 at 02:20:07AM -0400, Robert Parker wrote:
> > I don't remember where I read this but it only takes the crackers about 1
> > - 2 seconds to crack your average MD5 encrypted password. This is quite
> > logical because all they had
On Wed, Aug 14, 2002 at 02:20:07AM -0400, Robert Parker wrote:
>
> I don't remember where I read this but it only takes the crackers about 1 - 2
> seconds to crack your average MD5 encrypted password. This is quite logical
> because all they had to do is make a database of all of the MD5 sums of
On Wed, 14 Aug 2002, Robert Parker wrote:
>-On Tuesday 13 August 2002 12:20 pm, you wrote:
>-> Makes sense, except if you use upper and lowercase characters,
>-> numbers, and symbols (as you should for secure passwords). I
>-> would think that with these kind of passwords, storing the sheer
>-> n
ubject: Re: Re[2]: [PHP] Credit Card suggestions
On Wed, 14 Aug 2002, Robert Parker wrote:
>-On Tuesday 13 August 2002 12:20 pm, you wrote:
>-> Makes sense, except if you use upper and lowercase characters,
>-> numbers, and symbols (as you should for secure passwords). I would
True, and there's always the MCRYPT library.
Adam Voigt
[EMAIL PROTECTED]
On Tue, 2002-08-13 at 12:48, John S. Huggins wrote:
> On Wed, 14 Aug 2002, Robert Parker wrote:
>
> >-On Tuesday 13 August 2002 12:20 pm, you wrote:
> >-> Makes sense, except if you use upper and lowercase characters,
> >
On Wed, 14 Aug 2002, Robert Parker wrote:
>-On Tuesday 13 August 2002 12:20 pm, you wrote:
>-> Makes sense, except if you use upper and lowercase characters,
>-> numbers, and symbols (as you should for secure passwords). I
>-> would think that with these kind of passwords, storing the sheer
>-> n
If I could find the link I would send it, but I read about 6 months
back on RSA Data Security's website that a study was being done by
mathemetician's and at the time they were theorizing that they highly
doubted any overlap in keysums but if such did exist they believed that
the key you would hav
On Tuesday 13 August 2002 12:20 pm, you wrote:
> Makes sense, except if you use upper and lowercase characters,
> numbers, and symbols (as you should for secure passwords). I
> would think that with these kind of passwords, storing the sheer
> number of posibilites would get slightly large. And I
Makes sense, except if you use upper and lowercase characters,
numbers, and symbols (as you should for secure passwords). I
would think that with these kind of passwords, storing the sheer
number of posibilites would get slightly large. And I mean even
if it is easy to break, it's more secure then
On Tuesday 13 August 2002 10:57 am, you wrote:
> MD5 encryption of passwords is secure since you do not need to decrypt the
> password ever (in fact you can't). You just encrypt the password that the
> user entered and check if the MD5 of each password is the same, then the
> user most likely ent
ssage -
From: "Sascha Braun" <[EMAIL PROTECTED]>
To: "PHP Mailingliste" <[EMAIL PROTECTED]>
Sent: Tuesday, August 13, 2002 10:52 AM
Subject: AW: Re[2]: [PHP] Credit Card suggestions
> If there is no secure way to store creditcards on webservers, please tel
browsers than IE.
Thanks
Schura
-Ursprungliche Nachricht-
Von: Geoff Caplan [mailto:[EMAIL PROTECTED]]
Gesendet: Dienstag, 13. August 2002 10:20
An: Mike Mannakee; [EMAIL PROTECTED]
Betreff: Re[2]: [PHP] Credit Card suggestions
Mike,
>>Does anyone have any suggested method of
will be made using the right CC and not an old one or
even someone else CC.
HTH, C.
> -Original Message-
> From: Geoff Caplan [mailto:[EMAIL PROTECTED]]
> Sent: Tuesday, August 13, 2002 5:20 AM
> To: Mike Mannakee; [EMAIL PROTECTED]
> Subject: Re[2]: [PHP] Credit C
Mike,
>>Does anyone have any suggested method of scrambling a user's credit card
>>number before I stick it in a mysql database?
With respect, if you have to ask the question, you don't have the
technical skills to do this safely. In particular, there is no way to
keep the numbers secure if you
14 matches
Mail list logo