I wouldn't type into that web page either. I used Brian's handler that uses their API and only sends a few characters of the hash to the database. The article explains how it works and includes ways to set up the system on your own server if you want. After reading through it I was convinced it was a safe check.
--
Jacqueline Landman Gay         |     jac...@hyperactivesw.com
HyperActive Software           |     http://www.hyperactivesw.com



On February 27, 2018 10:26:48 AM Bob Sneidar via use-livecode <use-livecode@lists.runrev.com> wrote:

I would highly recommend NOT typing ANY current password you are using into a web page like this. If no one knew about it before, they sure as hell know it now! Whether they avail themselves of it is anyone's guess.

Bob S


On Feb 24, 2018, at 13:17 , J. Landman Gay via use-livecode <use-livecode@lists.runrev.com> wrote:

I just got around to trying this -- *very* useful, thanks for posting it.

There are no matches for any of my passwords I've tried so far. :) On
the other hand, even "AbrahamLincoln" has 128 matches. And you have to
insert commas to read the number returned for "qwerty".



_______________________________________________
use-livecode mailing list
use-livecode@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your subscription preferences:
http://lists.runrev.com/mailman/listinfo/use-livecode



_______________________________________________
use-livecode mailing list
use-livecode@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your subscription 
preferences:
http://lists.runrev.com/mailman/listinfo/use-livecode

Reply via email to