1
  • Is there really a security advantage when it comes to spittling a password?

    I've been reading more and more about the LANMAN (LM) hash and I'm having trouble understanding some of the concepts. Is there really any security advantage when it comes to splitting a password, encrypting the two halves separately, and combining the halves to form one hash? Or is it just more of...

    ITKE345,300 pointsBadges:
  • How secure is Identity-Based encryption?

    Over the past several years, I was always taught to never create my own crypto algorithm. But now I'm looking into Voltage SecureMail (which does use identity-based encryption) and I think I'm way over my head in trying to figure out the quality of the system.If you've used Voltage before, I'm...

    ITKE345,300 pointsBadges:
  • How to find cyphers for HTTPs?

    I'm trying to find some cyphers which are known to be secure for HTTPs. The OpenSSL website has a long list of cyphers that can be used with SSL and TLs, but how to tell which, if any, are still valid and of those which would support HTTPS? Is there a recent paper or similar tool I can use to find...

    ITKE345,300 pointsBadges:
  • GUIDs: Are they actually safe?

    I'm studying to become a security expert and I've noticed a ton of websites use GUIDs for password resets, unsubscribe requests, etc. I'm assuming most sites use them because they're easy to use and they're unique. But I'm curious to find out how safe GUIDs actually are. Are they actually intended...

    ITKE345,300 pointsBadges:
  • Do spaces in paraphrashes add more security?

    When using paraphrases I often see extra spaces added to the sentences. Does this provide more security than a single line of attached character text?

    ITKE345,300 pointsBadges:
  • What is the best way to protect a 4 digit password?

    I've read that hackers can hit all 10,000 possible variations of a 4-digit pin code within 5 minutes. Is this true? If so, what is the best way to secure the password - hashing, salting, bcrypt, or something else?

    ITKE345,300 pointsBadges:
  • Emulating bad blocks on a VM

    A user recently submitted this question via e-mail: I need to test some crypto utilities on a VM; does anyone know how I could emulate bad blocks? I know it’s possible to hook up a device via USB and connect it that way, but I’d like to see if there is a way I could specify bad blocks right on...

    ITKE345,300 pointsBadges:
1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following