DeaconBlues posted:In the past I've used the MD5 of a simple string (such as a car license plate) and I know that people here will poo poo brix that I used something as insecure as MD5 but, hey, it's better than the original password! What's wrong with MD5? I mean, it turns my street's name (why are you using license plate numbers instead of something easy to remember when you're stretching it into a good password anyway? We're trying to keep things simple here!) into "0904572d42fdd0ef1cd93fb1047fe2d0." That's a great password! Look how long and random it is! And without involving super complicated hard to learn software like Keepass. Don't make this more difficult than it has to be, just use md5. Edit: Holy poo poo you guys, this post was joke response to a post that I'm still pretty sure is itself a joke. I mean I called Keepass "super complicated and hard to learn," because he said "Please don't suggest Keepass, I'm looking for simplicity," after asking for help with a hilariously convoluted method of creating passwords. I don't think anyone who actually thinks Keepass is super hard would be able to find the "Post" button. Theris fucked around with this message at 19:57 on Nov 20, 2015 |
|
# ¿ Nov 20, 2015 18:37 |
|
|
# ¿ May 6, 2024 17:58 |
Wow. I was considering throwing "What is wrong with you? Just use keepass." in spoiler tags, but it really seemed like he was joking so I just went with it. Poe's law is a bitch.
Theris fucked around with this message at 19:44 on Nov 20, 2015 |
|
# ¿ Nov 20, 2015 19:42 |
Supposedly the Cortex-a55 is not vulnerable (it's in-order, but does do branch prediction so that may not be true), and if so is definitely in the running for the fastest chip that isn't.
|
|
# ¿ Jan 12, 2018 17:34 |
Dylan16807 posted:But obtaining the PII of alleged pirates is not what they did. They hacked exactly one person. They intentionally placed malware on the computers of every customer who downloaded that update. That's corporate death penalty worthy, it doesn't matter if they only actually activated it for one person.
|
|
# ¿ Feb 21, 2018 14:37 |
Mr Chips posted:Speaking of KeepAss, is it reasonable to assume that the Argon2 key derivation function provides some protection against brute-force attacks? Yes. The point of a key derivation function is to make each attempt of a different password require a non-trivial amount of compute resources. (Argon2 can require processor time, memory, or both depending on how it's configured) A good one can dramatically increase the time needed for brute-forcing.
|
|
# ¿ Feb 26, 2018 13:41 |
Rufus Ping posted:Isn't this just the usual delegated access via oauth business? Non story imo "Apps that you've granted access to your Gmail account can access your Gmail account" as a headline doesn't generate many clicks.
|
|
# ¿ Sep 30, 2018 22:57 |
BangersInMyKnickers posted:Even with AES-NI, software encryption overhead with an average SDD like an EVO 840 can pretty much saturate an average CPU when its cranking with enough active threads to hit all cores.. What are you considering an "average CPU" here? Software Bitlocker on my 950 Pro (thanks for never actually enabling eDrive like you said you would, Samsung ) with a 6700k has zero performance impact in disk benchmarks and CPU usage low enough that it more or less blends into the background noise of how much CPU gets used when hitting a disk hard anyway. Theris fucked around with this message at 01:19 on Nov 6, 2018 |
|
# ¿ Nov 6, 2018 01:15 |
|
|
# ¿ May 6, 2024 17:58 |
Daman posted:is it actually enabled? you do need to disable and then re-enable bitlocker on the drive after toggling it. I have to enter the Bitlocker passphrase (I don't have a TPM) to boot, so I assume so. Maybe not? Edit: Seriously misremembered Veracrypt benchmark results, deleted the part of the post based on that. Theris fucked around with this message at 09:13 on Nov 6, 2018 |
|
# ¿ Nov 6, 2018 08:59 |