A lot goes on behind the scenes in a password manager. Here’s what happens and why it is a good idea to use them.
FIRST, HOW PASSWORDS ACTUALLY WORK
Most people think that when they are trying to log into their account on a website, the website simply compares the password they have input with the password that they have stored in their database. So if your password is “password123,” it is stored as such in the database and the website simply checks if you have entered “password123” against their database when you are trying to log in. This is what is known as storing passwords in plain text and it is a lazy and horrible security practice that, hopefully, no website practices today.
Instead, most decent websites store what is known as a salted hash of a password and not the actual password itself. A hash is a one-way function that is applied to the password to scramble it. This way, if the website is hacked, the hacker only gets his hands on the hash of a password and not the actual password itself.
To make things even more secure, random data is typically added to the password before it is hashed. This random data is known as a salt and is usually appended and assigned to a user’s password during account creation. The resultant hashed value is known as the salted hash. So the next time a user logs in, the website takes the password and looks for the salt associated with the account and checks if the resultant hashed value matches the salted hash that it has in its database.
Diese Geschichte stammt aus der June 2019-Ausgabe von HWM Singapore.
Starten Sie Ihre 7-tägige kostenlose Testversion von Magzter GOLD, um auf Tausende kuratierte Premium-Storys sowie über 8.000 Zeitschriften und Zeitungen zuzugreifen.
Bereits Abonnent ? Anmelden
Diese Geschichte stammt aus der June 2019-Ausgabe von HWM Singapore.
Starten Sie Ihre 7-tägige kostenlose Testversion von Magzter GOLD, um auf Tausende kuratierte Premium-Storys sowie über 8.000 Zeitschriften und Zeitungen zuzugreifen.
Bereits Abonnent? Anmelden
Clash Of The Executive Saloons: BMW 5201 Vs Mercedes-Benz E200
The BMW 5 series and Mercedes-Benz E-Class are motoring institutions.
Should I Buy Cyberinsurance?
Personal cyberinsurance covers a range of cybercrimes such as cyber extortion, cyberbullying, online fraud, and data loss.
Quick Tips: Five Things To Do If You Get Hacked
It might seem like an obvious choice at first, but many people often resort to panic-clicking device options, rebooting, Googling for solutions, calling tech support (or that tech-savvy friend) for help, all while leaving the compromised device connected.
SENNHEISER TULLAMORE FACTORY TOUR: HOW THE WORLD'S BEST HEADPHONES ARE MADE IN IRELAND
It’s a relatively common practice for brands to have separate facilities for parts manufacturing and product assembly, whether it’s for cost or other reasons.
Tech Awards 2024 Readers' Choice
BEST OF PERSONAL COMPUTING
Good For Nothing
After a rocky start with the Nothing Phone (1), the company turned things around by releasing the incredible Nothing Phone (2).
A For Affordable AI
The Google Pixel 8a has arrived, offering many features from its flagship siblings at a more affordable price. It maintains a sleek, compact design, making it easy to handle with one hand.
Mercedes Benz EQS SUV
Mercedes-Benz's adoption of electricity has been impressively rapid.
5 Steps To Secure Your Home With A Mesh Network
Firewalls filter data in network traffic to protect the network from a wide variety of malicious attacks and malware.
The Best Hair Straightener
When I first saw the Dyson Airstrait straightener, my immediate feelings were one of cautious optimism.