D
Don Y
Guest
Hi Sylvia,
On 1/13/2015 5:40 PM, Sylvia Else wrote:
I currently use the existing tables to determine criteria for the passwords
that *I* use! I.e., sure don't want *my* accounts vulnerable to such
easy attacks!
[Hacked my BinL's laptop as they were headed into divorce just so my
sib could see what he'd been up to!]
On 1/13/2015 5:40 PM, Sylvia Else wrote:
On 14/01/2015 4:41 AM, Don Y wrote:
Increasingly, as "memory" (primary, secondary, etc.) becomes cheap, you
are seeing algorithms swing to the other end of the spectrum -- burning
memory to save *time*.
Look forward to seeing salted rainbow tables online.
I currently use the existing tables to determine criteria for the passwords
that *I* use! I.e., sure don't want *my* accounts vulnerable to such
easy attacks!
[Hacked my BinL's laptop as they were headed into divorce just so my
sib could see what he'd been up to!]