Site Map - skip to main content

Hacker Public Radio

Your ideas, projects, opinions - podcasted.

New episodes every weekday Monday through Friday.
This page was generated by The HPR Robot at


hpr1598 :: Hashing and Password Security

Understanding password security begins with understanding hashing.

<< First, < Previous, , Latest >>

Thumbnail of Ahuka
Hosted by Ahuka on Wednesday, 2014-09-17 is flagged as Clean and is released under a CC-BY-SA license.
hashing, passwords. 2.
The show is available on the Internet Archive at: https://archive.org/details/hpr1598

Listen in ogg, spx, or mp3 format. Play now:

Duration: 00:26:28

Privacy and Security.

In this open series, you can contribute shows that are on the topic of Privacy and Security

Today, the most common way of providing security in giving access to data or systems is through the use of passwords. Practically every online site now expects you to create an account with a password, which will let you post comments, order products, conduct business, or just post to social media. The implication is that insisting on passwords provides some level of security. Now, following on our last tutorial we should ask a few questions about just how effective this measure is, since someone posting in your name to Twitter is significantly different from someone accessing your bank account. And since the assets being protected are very different, it would be reasonable to approach the problem of security somewhat differently in these cases. But given the ubiquity of passwords as the authentication for online accounts, we need to look at the security involved. Note that I am approaching this from the standpoint of the owner of the site in question for this tutorial, and will follow up with a look at your own role in this.
For more go to https://www.zwilnik.com/?page_id=640

Links:


Comments

Subscribe to the comments RSS feed.

Comment #1 posted on 2014-09-18 07:34:22 by gigasphere

Great episode

Thanks Ahuka, I found this episode really useful in assisting my understanding of the subject particularly when talking about the salted hash and which hashing algorithms are the minimum standard now.

Comment #2 posted on 2014-09-21 00:03:01 by Kevin O'Brien

Thank you for the comment

Thank you gigasphere for the comment. It is nice to know I'm giving useful information. We have more to come.

Leave Comment

Note to Verbose Commenters
If you can't fit everything you want to say in the comment below then you really should record a response show instead.

Note to Spammers
All comments are moderated. All links are checked by humans. We strip out all html. Feel free to record a show about yourself, or your industry, or any other topic we may find interesting. We also check shows for spam :).

Provide feedback
Your Name/Handle:
Title:
Comment:
Anti Spam Question: What does the letter P in HPR stand for?
Are you a spammer?
Who is the host of this show?
What does HPR mean to you?