Originally posted by: Nothinman
-> FAQ
Originally posted by: AndyHui
No cracks, no bugs. No way to get around it.
Once again I ask the question, why is it that people ignore what I have to say?
Originally posted by: AndyHui
No cracks, no bugs. No way to get around it.
Originally posted by: CTho9305
Originally posted by: AndyHui
No cracks, no bugs. No way to get around it.
Once again I ask the question, why is it that people ignore what I have to say?
because the FAQs rarely have answers to my questions.... so I dont check them first.
None known Do you happen to know which algorith MS uses? I did a search a while back on their site and I dont hink I found the answer.
No cracks, no bugs. No way to get around it.
Originally posted by: STaSh
No cracks, no bugs. No way to get around it.
ALL encryption can be broken...its just a matter of having the horsepower and patience to do it.
have you seen the size of the keys? it would take an RC5-style project to crack in reasonable time
Im trying to come up with a 64 character password (the limit on OpenBSD IIRC)
Originally posted by: n0cmonkey
Who uses 8 character passwords? Im trying to come up with a 64 character password (the limit on OpenBSD IIRC) 😛
Originally posted by: GigaCluster
Linux allows passwords up to 255 characters if you configure it to use MD5 encryption.
I wonder how many centuries it'd take to brute-force a password that long using today's machines.
For reference, my root password for my three machines is 21 characters long, and uses both upper/lower chars, digits, and symbols above digits. Good luck cracking something like that.
Originally posted by: n0cmonkey
Originally posted by: GigaCluster
Linux allows passwords up to 255 characters if you configure it to use MD5 encryption.
I wonder how many centuries it'd take to brute-force a password that long using today's machines.
For reference, my root password for my three machines is 21 characters long, and uses both upper/lower chars, digits, and symbols above digits. Good luck cracking something like that.
MD5 hashes arent very long, there are bound to be duplicates out there somewhere... 😛
I really need to work on my passwords, some of them are good, some arent all that great.
Originally posted by: CTho9305
Originally posted by: n0cmonkey
Originally posted by: GigaCluster
Linux allows passwords up to 255 characters if you configure it to use MD5 encryption.
I wonder how many centuries it'd take to brute-force a password that long using today's machines.
For reference, my root password for my three machines is 21 characters long, and uses both upper/lower chars, digits, and symbols above digits. Good luck cracking something like that.
MD5 hashes arent very long, there are bound to be duplicates out there somewhere... 😛
I really need to work on my passwords, some of them are good, some arent all that great.
you wanna type 64 characters??? i type 9 for my "best" and its hard enough to crack
Who uses 8 character passwords? Im trying to come up with a 64 character password (the limit on OpenBSD IIRC)
Originally posted by: farmercal
Perhaps I am too new to the XP thing right now but could someone explain to me what happened to this guys files? I am using NTFS and would like to avoid what happened here if I can. From what I can gather when he reinstalled his OS he lost access to his files? If so, why? Shouldn't the passwords he used before still be valid? And if not can't they be converted to something else via PM7 or something?
Originally posted by: n0cmonkey
Originally posted by: farmercal
Perhaps I am too new to the XP thing right now but could someone explain to me what happened to this guys files? I am using NTFS and would like to avoid what happened here if I can. From what I can gather when he reinstalled his OS he lost access to his files? If so, why? Shouldn't the passwords he used before still be valid? And if not can't they be converted to something else via PM7 or something?
He encrypted them, didnt back up the key, reinstalled (which deleted his key). The files are still there. I think he can still access them. But he cannot decrypt them. There is a FAQ on backing up your encryption key.