public marks

PUBLIC MARKS with tags sha1 & md5

2011

What You Need To Know About Secure Password Schemes

by jon123 (via)
Matasano Security LLC - Chargen - Enough With The Rainbow Tables: What You Need To Know About Secure Password Schemes

2009

md5.rednoize.com - reverse engineer md5 hashes - powered by rednoize.com

by CharlesNepote & 5 others, 2 comments
Moteur de recherche qui permet de retrouver des mots de passe hashés en md5 ou sha1.

2007

as3corelib - Google Code

by greut & 1 other
ActionScript 3.0 library for several basic utilities.

Tutoriel : Sécuriser un site Internet (MD5, SSL et sessions)

by nfroidure
Un tutoriel pour comprendre les enjeux de la sécurisation d'un site Internet, et des conseils pour la mettre en place.

Storing Passwords in MySQL

by Xavier Lacot & 2 others
Securing plain text passwords in MySQL is NEVER a good idea. As a DBA you should take great care in protecting the users' information. Fortunately MySQL provides you with several options to protect passwords.

2006

MD5 Crack

by MageDealer
MD5 cracking site that uses Rainbow Tables and big dictionary search for md5 hash cracking

2005

Javascript md5 (and md4 and sha1)

by nhoizey & 5 others
The MD4, MD5 and SHA-1 algorithms are secure hash functions. They take a string input, and produce a fixed size number - 128 bits for MD4 and MD5; 160 bits for SHA-1. This number is a hash of the input - a small change in the input results in a substantial change in the output. The functions are thought to be secure, in the sense that it would require an enormous amount of computing power to find a string which hashes to a chosen value. In others words, there's no way to decrypt a secure hash. The uses of secure hashes include digital signatures and challenge hash authentication.

Javascript md5 (and md4 and sha1)

by Krome & 5 others
The MD4, MD5 and SHA-1 algorithms are secure hash functions. They take a string input, and produce a fixed size number - 128 bits for MD4 and MD5; 160 bits for SHA-1. This number is a hash of the input - a small change in the input results in a substantial change in the output. The functions are thought to be secure, in the sense that it would require an enormous amount of computing power to find a string which hashes to a chosen value. In others words, there's no way to decrypt a secure hash. The uses of secure hashes include digital signatures and challenge hash authentication.

Javascript md4, md5 and sha1 algorithms

by benoit & 5 others
The MD4, MD5 and SHA-1 algorithms are secure hash functions. They take a string input, and produce a fixed size number - 128 bits for MD4 and MD5; 160 bits for SHA-1. This number is a hash of the input - a small change in the input results in a substantial change in the output. The functions are thought to be secure, in the sense that it would require an enormous amount of computing power to find a string which hashes to a chosen value. In others words, there's no way to decrypt a secure hash. The uses of secure hashes include digital signatures and challenge hash authentication.

Active users

jon123
last mark : 16/03/2011 07:12

CharlesNepote
last mark : 14/05/2009 12:56

greut
last mark : 26/08/2007 21:26

nfroidure
last mark : 19/03/2007 13:24

Xavier Lacot
last mark : 25/01/2007 00:54

MageDealer
last mark : 10/11/2006 12:38

nhoizey
last mark : 03/02/2005 12:47

Krome
last mark : 03/02/2005 07:44

benoit
last mark : 03/02/2005 17:24