- Feature Articles
- CodeSOD
- Error'd
- Forums
-
Other Articles
- Random Article
- Other Series
- Alex's Soapbox
- Announcements
- Best of…
- Best of Email
- Best of the Sidebar
- Bring Your Own Code
- Coded Smorgasbord
- Mandatory Fun Day
- Off Topic
- Representative Line
- News Roundup
- Editor's Soapbox
- Software on the Rocks
- Souvenir Potpourri
- Sponsor Post
- Tales from the Interview
- The Daily WTF: Live
- Virtudyne
Admin
if(cow==frist) ++cnt;
Admin
Your password only has to be strong enough that the adversary uses a 0-day or backdoor. Nothing is completely secure, and at some point you wind up trading off usability. An air gap is much safer, but this is my browsing machine, not my <redacted> machine. Hopefully we're wise enough to make the right choice.
Admin
So what was happening is that "cnt" was being incremented every time it ran into a character that was used somewhere else in the string. It was checking the character at each position and every time split returned more than one string, it would increment. If the character "." showed up twice in the password, "cnt" would be incremented by 2 .
The length of the example password is 63 characters. Half of that length would be 31.5. The string "6Y9^}Ky.SK50ZR84.p,5u$380(G;m;bI%NZG%zHd?lOStqRzS}Z?t;8qSg;[gy@" has over 40 character positions containing characters that occur elsewhere in the string (at least 19 characters are not unique and several occur more than twice).
Admin
The password complexity is true - refering to "if (passwordComplexity == true && len > 8)"... yes.
Admin
Repeated characters can be bad, but forcing you not to repeat characters also means the password has less entropy.
Admin
One part of cracking the enigma code was the observation that no character was mapped to itself.