Salt and hash your passwords

Encryption attempts to secure information by passing it through algorithms that are difficult to crack without the appropriate keys. By definition anything encrypted can be reverse engineered by design. Hashing takes a string (A) and passes it through an algorithm to make another string (B) in such in manner that reverse engineering string (B) to […]


Security Stamping

Consider the following scenario: A user logs on to website with device A and does not log off Perhaps they lose the device e.g. a smart phone The user then panics, logs on to device B (laptop) goes to the website and changes their password The user would hope that device A no longer works […]