![]() If I say anything technical, you will hear me saying sorry. Then, I’m going to show you how it’s done in Python.īefore I proceed any further, I would like to point out that the purpose of this article is to show you the big picture I will avoid being technical here. In the next part of this article, I’m going to show you how hackers “decrypt” hashed password to the actual word (Well, they don’t actually decrypt, they guess). ![]() They can’t just copy your gibberish password and paste it into the login page because the algorithm will make a gibberish out of the gibberish word. In the event a hacker flirts with your database administrator and gains access to the database, all he’ll see is just the gibberish stuff. Responsible companies hash your passwords. They take the password you type into their sign-up page, make it gibberish, then store those gibberish words into their database. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |