|
You are here |
crackstation.net | ||
| | | | |
notes.volution.ro
|
|
| | | | | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms. | |
| | | | |
qsantos.fr
|
|
| | | | | [AI summary] The article discusses the security implications of client-side password hashing, arguing that it can be secure when combined with memory-hard functions and proper implementation. | |
| | | | |
dusted.codes
|
|
| | | | | SHA-256 is not a secure password hashing algorithm | |
| | | | |
www.pcworld.com
|
|
| | | What do you do if you're a LastPass user? Is it time to panic and find a new password manager? Here's some advice. | ||