Timeline for /etc/shadow file and password storing algorithm in Linux [duplicate]
Current License: CC BY-SA 4.0
9 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Feb 24 at 18:24 | history | closed | Stephen Kitt Romeo Ninov G-Man Says 'Reinstate Monica' ilkkachu doneal24 | Duplicate of How to find the hashing algorithm used to hash passwords? | |
| Feb 23 at 12:26 | vote | accept | PersianGulf | ||
| Feb 22 at 16:03 | answer | added | David G. | timeline score: 1 | |
| Feb 22 at 8:20 | review | Close votes | |||
| Feb 24 at 18:24 | |||||
| Feb 22 at 7:56 | history | edited | Vlastimil Burián | CC BY-SA 4.0 | edited title; edited tags |
| Feb 22 at 7:52 | comment | added | Vlastimil Burián | This is relatively good question, upvoted, but we need more information on why you need this, what you have tried, etc. Please avoid downvotes, and fill the gaps ASAP. Cheers | |
| Feb 22 at 6:32 | comment | added | PersianGulf | Unfortunately, yes, your password hashed with scrypt. | |
| Feb 22 at 6:22 | history | edited | PersianGulf | CC BY-SA 4.0 | deleted 2 characters in body |
| Feb 22 at 6:16 | history | asked | PersianGulf | CC BY-SA 4.0 |