* Posts by <h1>Aidan</h1>

2 publicly visible posts • joined 9 Aug 2010

Short passwords 'hopelessly inadequate', say boffins

<h1>Aidan</h1>

yes and no

As others have mentioned, this research is assuming that the attacker already has access the the password hashes, so the comments about limiting retry-rate and lock-outs, while valid, are not really relevant.

The problem is that a lot of passwords (especially in web sphere) are hashed with MD5 or one of the SHA versions. These are hashing algorithms that are designed to go fast.

The trick is to design a hashing algorithm that runs slowly. And salt your hashes.

Anti-virus defences even shakier than feared

<h1>Aidan</h1>

No need for parallels.

You can get Office for OSX.