Quote:
Originally Posted by Tandum
Don't panic just yet, they need the password hash file first, however that files is normally readable by anyone as no one expected this sort of speed being available for an attack.
We live in an amazing age ... Read it here.
|
Robin, what does this mean ( as in the above quote). The Hash file ( which I have heard of before) I thought was a comparison string to a files size/integrity.
So how can that be read by someone else?
Bartman