On Thu, Apr 24, 2008 at 10:10 PM, Thomas Hruska <[EMAIL PROTECTED]> wrote:

>  BTW, SHA-1 is considered to be broken and MD5 is considered to be broken
>  AND cracked.  As such, neither algorithm should be used in any security
>  critical applications.

It's in a lab, no way would I be doing this in clear text on a public network.

-- Brett
------------------------------------------------------------
"In the rhythm of music a secret is hidden;
 If I were to divulge it, it would overturn the world."
 -- Jelaleddin Rumi

Reply via email to