12-04-2015
I think, it is already approx. 10 years at least, as MD5 is considered insecure.
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hi,
I do not want the plaintext password to appear in the netrc file. So I want to encrypt the password. Is there a way to encrypt the password and still make ftp to use the netrc ?
Thanks in advance.
-Gow:confused: (2 Replies)
Discussion started by: ggowrish
2 Replies
2. UNIX for Dummies Questions & Answers
I'm tasked to change a user's password on multiple Linux systems (RH v3). I though copying the encrypted password from one Linux /etc/shadow file to another would work but I was wrong.
The long term solution is to establish an openLDAP Directory service, but for now I'm stuck with a manual... (1 Reply)
Discussion started by: benq70
1 Replies
3. UNIX Desktop Questions & Answers
Hi!!
How can I list the password settings for all the users??
Best regards (3 Replies)
Discussion started by: irasela
3 Replies
4. UNIX for Dummies Questions & Answers
Hello everyone and let me start off by thanking anyone who can help with this.
I work for a company that uses Unix as one of their servers. I'm not at all familar with Unix beyond logging after I restart the server:rolleyes: I'm looking for some command that will bring me up a list of current... (3 Replies)
Discussion started by: disgracedsaint
3 Replies
5. Shell Programming and Scripting
Hi folks,
What will be the easy way to decrypt encrypted passwords on MySQL table. Googling brought me many suggestions on crypt/decrypt running scripts. Please advise. TIA
Remark:
I think the encrypt function of MySQL uses the Unix crypt command to encrypt
B.R.
satimis (1 Reply)
Discussion started by: satimis
1 Replies
6. UNIX for Advanced & Expert Users
Hi
I wonder whether is possible to generate enrypted passwd for some user and paste it into /etc/shadow file ?
What kind of encryption is used in /etc/shadow file ?
ths for help. (1 Reply)
Discussion started by: presul
1 Replies
7. Linux
Hi,
Is it possible to convert MD5 passwords to SHA-512?
I'm about to migrate an old slackware server to Debian, then I noticed that they don't use same encryption method.
I'm aware that I can change the encryption method in Debian to MD5, but as far as I understand SHA-512 is more secure,... (2 Replies)
Discussion started by: urandom
2 Replies
8. UNIX for Dummies Questions & Answers
i have an application that uses the encrypted password that's in the /etc/shadow file.
i copied the line for the particular username i was interested it in from shadow file and i pasted it into the password file of the application. the application is nagios.
this application allowed that... (5 Replies)
Discussion started by: SkySmart
5 Replies
9. Shell Programming and Scripting
How to keep encrypted password in a shell script.?
I have the file which has the following:
a.sh
-----
username=abc
password=abc
I will be using this username and password in another script. But I don't want to reveal the password in the script. How to keep the password... (3 Replies)
Discussion started by: sanvel
3 Replies
10. Cybersecurity
Hello, on my android device my app autosaves my password and it encrypts by TLS
im not politically exposed person, just regular entrepreneur. Should i worry if i loose my phone with TLS encrypted password? Or regular mortals or casual hackers are not able to crack it? (4 Replies)
Discussion started by: postcd
4 Replies
LEARN ABOUT DEBIAN
apache::session::generate::md5
Apache::Session::Generate::MD5(3pm) User Contributed Perl Documentation Apache::Session::Generate::MD5(3pm)
NAME
Apache::Session::Generate::MD5 - Use MD5 to create random object IDs
SYNOPSIS
use Apache::Session::Generate::MD5;
$id = Apache::Session::Generate::MD5::generate();
DESCRIPTION
This module fulfills the ID generation interface of Apache::Session. The IDs are generated using a two-round MD5 of a random number, the
time since the epoch, the process ID, and the address of an anonymous hash. The resultant ID number is highly entropic on Linux and other
platforms that have good random number generators. You are encouraged to investigate the quality of your system's random number generator
if you are using the generated ID numbers in a secure environment.
This module can also examine session IDs to ensure that they are, indeed, session ID numbers and not evil attacks. The reader is
encouraged to consider the effect of bogus session ID numbers in a system which uses these ID numbers to access disks and databases.
This modules takes one argument in the usual Apache::Session style. The argument is IDLength, and the value, between 0 and 32, tells this
module where to truncate the session ID. Without this argument, the session ID will be 32 hexadecimal characters long, equivalent to a
128-bit key.
AUTHOR
This module was written by Jeffrey William Baker <jwbaker@acm.org>.
SEE ALSO
Apache::Session
perl v5.10.1 2010-10-18 Apache::Session::Generate::MD5(3pm)