Right, I wasn't worried about Troy's site. But I read through the
comments and there was a criticism that the site was vulnerable to
malicious intrusions. Because I wasn't using the site itself I didn't
worry. Troy also explained why the critcism wasn't entirely valid, but
the commenter was sti
Troy is a beast in the security community, so I would not be too worried
about him doing something nefarious. He is constantly working with white
hats and blue teams to get on top of issues as soon as there is even a peep
on the dark web.
On Tue, Feb 27, 2018 at 12:57 PM, J. Landman Gay via use-l
I wouldn't type into that web page either. I used Brian's handler that uses
their API and only sends a few characters of the hash to the database. The
article explains how it works and includes ways to set up the system on
your own server if you want. After reading through it I was convinced it
I would highly recommend NOT typing ANY current password you are using into a
web page like this. If no one knew about it before, they sure as hell know it
now! Whether they avail themselves of it is anyone's guess.
Bob S
> On Feb 24, 2018, at 13:17 , J. Landman Gay via use-livecode
> wrote
I just got around to trying this -- *very* useful, thanks for posting it.
There are no matches for any of my passwords I've tried so far. :) On
the other hand, even "AbrahamLincoln" has 128 matches. And you have to
insert commas to read the number returned for "qwerty".
On 2/22/18 10:50 PM, B
That is built in for LC9. You can use sha1digest though.
On Fri, Feb 23, 2018 at 7:52 AM Roger Eller via use-livecode <
use-livecode@lists.runrev.com> wrote:
> There seems to be a missing handler, "messageDigest".
>
> ~Roger
>
>
> On Thu, Feb 22, 2018 at 11:50 PM, Brian Milby via use-livecode <
>
There seems to be a missing handler, "messageDigest".
~Roger
On Thu, Feb 22, 2018 at 11:50 PM, Brian Milby via use-livecode <
use-livecode@lists.runrev.com> wrote:
> Read this interesting article about a half billion PW database of
> compromised passwords that I thought I'd share:
>
> *https://