I wouldn't type into that web page either. I used Brian's handler that uses
their API and only sends a few characters of the hash to the database. The
article explains how it works and includes ways to set up the system on
your own server if you want. After reading through it I was convinced it
was a safe check.
--
Jacqueline Landman Gay | jac...@hyperactivesw.com
HyperActive Software | http://www.hyperactivesw.com
On February 27, 2018 10:26:48 AM Bob Sneidar via use-livecode
<use-livecode@lists.runrev.com> wrote:
I would highly recommend NOT typing ANY current password you are using into
a web page like this. If no one knew about it before, they sure as hell
know it now! Whether they avail themselves of it is anyone's guess.
Bob S
On Feb 24, 2018, at 13:17 , J. Landman Gay via use-livecode
<use-livecode@lists.runrev.com> wrote:
I just got around to trying this -- *very* useful, thanks for posting it.
There are no matches for any of my passwords I've tried so far. :) On
the other hand, even "AbrahamLincoln" has 128 matches. And you have to
insert commas to read the number returned for "qwerty".
_______________________________________________
use-livecode mailing list
use-livecode@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your
subscription preferences:
http://lists.runrev.com/mailman/listinfo/use-livecode
_______________________________________________
use-livecode mailing list
use-livecode@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your subscription
preferences:
http://lists.runrev.com/mailman/listinfo/use-livecode