Par chance, tu viens de trouver une lampe magique... Tu la frottes et hop ! Un gentil génie apparait. Il te propose de formuler 3 voeux qu'il va dans la seconde exauser ! Alors, que vas-tu lui demander ? La paix dans le monde ? De l'argent pour tes proches ? A toi de répondre ! Bref, dis-nous tout ! Merci Marga 97 pour l'idée de ce sujet ! Si vous avez des idées de thème, vous pouvez me les indiquer à cette page: contact. A bientôt ! Noïs. |
Mon blog |
1.avoir des vœux a l'infinit | |||
Mon blog |
etre tjrs le majore de la classe sa c mon première voeux la 2ème c ke mn ptit cop1 ne ma plaque pas | |||
Mon blog |
être riche 2 devenir mannequin de chez channel 3 avoir des pou | |||
Mon blog |
rester avec mon coeur d amour avoir une l imousine et .. etre riche | |||
Mon blog |
1: j adore popo ma copine 2: j aime mes parents 3: je suis enfants quaté par mon grand pere | |||
Mon blog |
visitez mon blog et laissez moi plein de coms pleazzz ! ;-) | |||
Mon blog |
mark posted this on February 03, 2010 This is part 2 in a 3-part series about security at Meebo. See part 1. Before we get started I want to make it clear that sharing this information doesn't give away any secrets and doesn't make you any less safe! Today I'd like to talk about how we store the password for your Meebo account. Or more accurately, how we don't actually store the password for your Meebo account. Instead we store a "hash" created from your password. A hash is a string of characters that is calculated by running your password through an algorithm created by cryptographers (aka crazy smart math people). For a given password, the algorithm generates the same hash every time. It is easy to take a password and create a hash, but it is basically impossible to reverse this process, i.e. to take a hash and determine the original password. (For anyone curious, we're using bcrypt.) When you type your username and password to log into Meebo we calculate the hash of the password you provided. If this hash matches the hash stored in our database then you have successfully authenticated, yay! By storing a hash instead of the password, we greatly lessen the damage in the unlikely case that a hacker manages to get ahold of the information stored in our database. One weakness with this scheme is that, because many users use a simple word as their password, if a hacker is able to obtain the password hashes from our database then it would be possible for them to perform a "rainbow attack" to ascertain weak passwords. In this attack the hacker precomputes chains of hashes for each word in the dictionary and creates a rainbow table. The hacker would look up each hash from our database in this rainbow table. If he finds a match then he knows the password that was used to generate the hash. We neutralize rainbow attacks by "salting" the password before generating the hash. Salting means that a few letters are added to the password before the hash is calculated. We generate a few random letters for each user, and store this "salt" along with the password hash. In effect this makes everyone's password just a bit more random, which would require an unfeasibly large rainbow table. In summary: We store a salted hash of your password, NOT The password itself. These techniques are pretty brilliant and we certainly can't take credit for them—Unix at least has been using salted password hashes since the 1970s. It is our hope that sharing this information inspires other companies to be equally diligent with their own websites. Stay tuned for part 3, coming in a few days! Mark [ comments ] [ past blogs ] Follow us on | |||
Mon blog |
:être immortel avec ma famille 2:chanter avec mes stars préfères 3: faire tout les voeu que je veut | |||
Mon blog |
1:être immortel avec ma famille 2:chanter avec mes stars préfères 3: faire tout les voeu que je veut | |||
Mon blog |
mark posted this on February 03, 2010 This is part 2 in a 3-part series about security at Meebo. See part 1. Before we get started I want to make it clear that sharing this information doesn't give away any secrets and doesn't make you any less safe! Today I'd like to talk about how we store the password for your Meebo account. Or more accurately, how we don't actually store the password for your Meebo account. Instead we store a "hash" created from your password. A hash is a string of characters that is calculated by running your password through an algorithm created by cryptographers (aka crazy smart math people). For a given password, the algorithm generates the same hash every time. It is easy to take a password and create a hash, but it is basically impossible to reverse this process, i.e. to take a hash and determine the original password. (For anyone curious, we're using bcrypt.) When you type your username and password to log into Meebo we calculate the hash of the password you provided. If this hash matches the hash stored in our database then you have successfully authenticated, yay! By storing a hash instead of the password, we greatly lessen the damage in the unlikely case that a hacker manages to get ahold of the information stored in our database. One weakness with this scheme is that, because many users use a simple word as their password, if a hacker is able to obtain the password hashes from our database then it would be possible for them to perform a "rainbow attack" to ascertain weak passwords. In this attack the hacker precomputes chains of hashes for each word in the dictionary and creates a rainbow table. The hacker would look up each hash from our database in this rainbow table. If he finds a match then he knows the password that was used to generate the hash. We neutralize rainbow attacks by "salting" the password before generating the hash. Salting means that a few letters are added to the password before the hash is calculated. We generate a few random letters for each user, and store this "salt" along with the password hash. In effect this makes everyone's password just a bit more random, which would require an unfeasibly large rainbow table. In summary: We store a salted hash of your password, NOT The password itself. These techniques are pretty brilliant and we certainly can't take credit for them—Unix at least has been using salted password hashes since the 1970s. It is our hope that sharing this information inspires other companies to be equally diligent with their own websites. Stay tuned for part 3, coming in a few days! Mark [ comments ] [ past blogs ] Follow us on Twitter | |||
1: voir les acteur est actrice de TWILIGHT 2: voir l' opéra rock en concert 3:que mon amour dure longtemps | ||||
Mon blog |
1 être riche 2 devenir mannequin de chez channel 3 avoir des pouvoir | |||
1: j adore popo ma copine 2: j aime mes parents 3: je suis enfants quaté par mon grand pere | ||||
1 je ve que ma famille et moi ont soi immortele 2 je ve pu de devoir( mais j aime bien l école) et 3 je ve avoir tous les voeu que je ve . |