Skip to main content
21 events
when toggle format what by license comment
Mar 17, 2017 at 13:14 history edited CommunityBot
replaced http://security.stackexchange.com/ with https://security.stackexchange.com/
Dec 13, 2016 at 14:55 answer added user3083447 timeline score: 0
Apr 18, 2016 at 11:48 vote accept George Powell
Apr 18, 2016 at 11:48
Apr 13, 2016 at 2:06 answer added lepe timeline score: -2
Apr 14, 2014 at 11:34 review Suggested edits
Apr 14, 2014 at 12:26
Apr 2, 2013 at 10:55 comment added Sedat Kapanoglu why not add a sleep(15000); after each hash? sure benefits are unknown but it certainly doesn't make it less secure :)
Apr 2, 2013 at 0:05 answer added emory timeline score: 2
Apr 1, 2013 at 21:42 history edited George Powell CC BY-SA 3.0
added 586 characters in body
Apr 1, 2013 at 17:58 answer added Thomas Pornin timeline score: 14
Apr 1, 2013 at 15:10 comment added Brendan Long If your goal is just to protect against an attacker without access to your source code, then using a pepper (basically a hard-coded secret value that you hash along with the password) would be sufficient, and less error-prone than creating your own hash function.
Apr 1, 2013 at 12:16 vote accept George Powell
Apr 18, 2016 at 11:48
Apr 1, 2013 at 11:32 answer added Polynomial timeline score: 73
Apr 1, 2013 at 10:54 answer added Marcks Thomas timeline score: 9
Apr 1, 2013 at 10:49 history edited George Powell CC BY-SA 3.0
deleted 25 characters in body
Apr 1, 2013 at 7:36 answer added ponsfonze timeline score: 6
Apr 1, 2013 at 4:04 answer added Eric G timeline score: 5
Apr 1, 2013 at 3:10 answer added Stephen Touset timeline score: 9
Apr 1, 2013 at 2:03 answer added Adam Caudill timeline score: 15
Apr 1, 2013 at 1:54 history tweeted twitter.com/#!/StackSecurity/status/318541799167774720
Apr 1, 2013 at 1:41 review First posts
Apr 1, 2013 at 1:54
Apr 1, 2013 at 1:24 history asked George Powell CC BY-SA 3.0