Talk:Password cracking
From Wikipedia, the free encyclopedia
The statement "Proprietary encryption algorithms which rely on obscurity for security are much more likely to succumb to such attacks." was POV. I think a cited source is in order for this statement.
- Agreed. — Matt Crypto 18:48, 23 Mar 2005 (UTC)
Please be slightly more careful while editing. 'Memoization' is a real word, not a typo. It is explained only a couple of sentences before the place where you corrected it to 'memorization'. Also, there are two separate attacks that salting protects against -- precomputation and memoization. Each one can be carried out without the other. Please do not roll them into one or brush one under the carpet. Thank you. Arvindn 02:09, 23 July 2005 (UTC)
- Quite right, sorry. --agr 09:17, 24 July 2005 (UTC)
a suggestion for the Prevention section
There are alternatives to what Linux does ;-) http://cvs.openbsd.org/papers/bcrypt-paper.ps
[edit] Weak encryption
This section should be rewriten. A stark encryption method doesn't mean that it is a stark hash method. (it is a common error)
[edit] Password recovery programs
This page would benefit from an expanded list of password recovery software, including which is freeware and which is not. There are many commercial programs, but I know there are free ones too. I'm thinking of the types of programs which recover passwords from Access, Excel, Word, WordPerfect, and .zip files. There are legit uses for such software, such as finding the password I put on a .zip file I made 5 years ago! 2006-08-18.
- Wikipedia is not a directory and should not promote every random software that exists. Those things can be found on directories like dmoz. --Spoon! 10:30, 31 August 2006 (UTC)