![This is a normal post](/images/board_posticon.gif)
I wrote a little script to MD5 some data and replace it.
Internet explorer just spacked out and opened up a window 20 times.
It's md5'd the md5'd data over and over.
Naturaly, my backup is over a month old
=/
( , Fri 12 Jan 2007, 15:21, archived)
![This is a normal post](/images/board_posticon.gif)
Mail Daemon
Masturbate Dodgily
Mandatory Debate
Multi Disk
Masticate Data
( , Fri 12 Jan 2007, 15:22, archived)
![This is a normal post](/images/board_posticon.gif)
has that been Shopped? It doesn't look like that beard belongs to him.
( , Fri 12 Jan 2007, 15:28, archived)
![This is a normal post](/images/board_posticon.gif)
it's the only bit of humour and sense I could scour from it
( , Fri 12 Jan 2007, 15:29, archived)
![This is a normal post](/images/board_posticon.gif)
so I'm not quite sure what you're on about. it does sound somewhat vexing though.
( , Fri 12 Jan 2007, 15:24, archived)
![This is a normal post](/images/board_posticon.gif)
so I toastered them retroactively and arfed them over to my protazoa, so in the end it was X.o.S
( , Fri 12 Jan 2007, 15:24, archived)
![This is a normal post](/images/board_posticon.gif)
but i have had a honey&marmite sandwich before, and enjoyed it.
( , Fri 12 Jan 2007, 15:30, archived)
![This is a normal post](/images/board_posticon.gif)
FINE. i also have jam (apricot, raspberry, blackberry), marmalade, peach curd, or cheese or beans or eggs which all need cooking.
( , Fri 12 Jan 2007, 15:32, archived)
![This is a normal post](/images/board_posticon.gif)
but not marmite. But I would love some blackberry jam
( , Fri 12 Jan 2007, 15:34, archived)
![This is a normal post](/images/board_posticon.gif)
*posts to "Grrrmachine, Poland"
( , Fri 12 Jan 2007, 15:37, archived)
![This is a normal post](/images/board_posticon.gif)
i hardly ever eat any of these things, either... *shakes head in disbelief*
i did not realise i had so many toast-topping products.
( , Fri 12 Jan 2007, 15:35, archived)
![This is a normal post](/images/board_posticon.gif)
Since MD5 is not reversable but is a math algorithem anyway so you could never work back to original data after encoding it.
But with original data and MD5 it you can compare for a match.
In other words what was the point in MD5'ing it in the first place? (since it cannot be decoded to become useful again).
( , Fri 12 Jan 2007, 15:25, archived)
![This is a normal post](/images/board_posticon.gif)
so instead of storing the raw-text password, I turned it into MD5($password."[some key]") and I encrpyt the password and compaire it on the database.
( , Fri 12 Jan 2007, 15:30, archived)
![This is a normal post](/images/board_posticon.gif)
meaning that even if you did it 20 times, the script would recieve the same data to begin with 20 times
( , Fri 12 Jan 2007, 15:32, archived)
![This is a normal post](/images/board_posticon.gif)
// check admin stuff
// Get all the userIDs and Passwords
{
// update user with md5($password."[key]")
}
( , Fri 12 Jan 2007, 15:34, archived)
![This is a normal post](/images/board_posticon.gif)
...why not store the original password and just MD5 for the search and compare to ensure secure data transition?
Or as I suggest above, start using a reversable encryptuion like mcrypt (free PHP source).
( , Fri 12 Jan 2007, 15:32, archived)
![This is a normal post](/images/board_posticon.gif)
You should never store them as raw-text, it was just during a beta-phase.
I've never heard of mcrpt, so I wouldn't of used it.
( , Fri 12 Jan 2007, 15:36, archived)
![This is a normal post](/images/board_posticon.gif)
md5 the password and store in DB. When comparing passwords you md5 the input, with salt if you like, to the md5 hash in db.
There is *no* reason whatsover to store original passwords, and if anyone got access to your DB, you may well have just screwed over every user.
/securityblog
( , Fri 12 Jan 2007, 15:36, archived)
![This is a normal post](/images/board_posticon.gif)
I don't know what you did wrong.
( , Fri 12 Jan 2007, 15:27, archived)