I can change it if that is what people want. I personally like not having blatant visible usernames or passwords in plain text files.
When comparing given password to stored password how do you use the same salt if it is random? Or is at random salt for that machine? Jason Tackaberry wrote: > On Sun, 2006-12-31 at 23:20 -0800, Ryan Roth wrote: > >> Your way behind :), I already changed it to use md5 >> > > No, I saw that. I was just saying not to hash the username, and to use > the conventional unix crypt command with a random salt (instead of the > username as salt). crypt(3) on any modern linux will use MD5 implicitly > so long as your salt follows the "$1$<salt>$" format. > > Jason. > > > ------------------------------------------------------------------------- > Take Surveys. Earn Cash. Influence the Future of IT > Join SourceForge.net's Techsay panel and you'll get the chance to share your > opinions on IT & business topics through brief surveys - and earn cash > http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV > _______________________________________________ > Freevo-users mailing list > Freevo-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/freevo-users > > ------------------------------------------------------------------------- Take Surveys. Earn Cash. Influence the Future of IT Join SourceForge.net's Techsay panel and you'll get the chance to share your opinions on IT & business topics through brief surveys - and earn cash http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV _______________________________________________ Freevo-users mailing list Freevo-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/freevo-users