Crypto hashes are really powerful and are the standard way of storing passwords in many systems.
You might now that a password hash is $5$sdsd7f89sd7fsda89f7$9AO/NHJbfjwllqiFOOeq63ICdSDwaejGNa36IL6d4pC. You might not use this information to find what the password that generates this hash is. The reason is that cryptographic checksums work only one way. You can take an input and turn it into a hash, but there is no practical way to take a hash and find what the input is out. Daniel wrote: > Haven't read the link yet, but .... > > If we assume a four digit, numeric only, password of "3072" (Decimal), I > could "hash", (i.e. subtract from) that with "9999" (Decimal) to produce > 6927 (Decimal). > > So, having encrypted my 3072, I must store the Hash, 6927, somewhere on my > computer, so that, when someone enters a "password", it's "Hash" can be > compared to the stored "Hash". > > This mustn't be how it works, as it seems to simply!! > > Guess I'll have to read the link! > _______________________________________________ support-seamonkey mailing list [email protected] https://lists.mozilla.org/listinfo/support-seamonkey

