Why would one assume that whenever someone would want to see the password, then he has bad intentions.
on my board, I had more than one person signing up with free email adresses such as hotmail and yahoo, only to spam the board with their filth.
Yes, I could ban the bad user, but he would have signed up with many many usernames, so when I ban one username he would enjoy relogging with another username and spreading his garbage again.
remember you can't always block the ip number.
sometimes the ip number is that of a proxy for a big city, and blocking this one person's ip would mean blocking the whole city....
the only way to know those people was to look at their password, as they were using the same password in all the other accounts that they planned to use once the username they are using now is banned.
Its because, the password is encrypted in the database, none of the vb hackers have actually really found out how to decrypt it, and if it were decrypted, alot of other security software would be in danger, the ones that use the same encryption tool.
Also I highly doubt the encryption is standard, it possible is random. Not really sure
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Its because, the password is encrypted in the database, none of the vb
hackers have actually really found out how to decrypt it, and if it were
decrypted, alot of other security software would be in danger, the ones that
use the same encryption tool.
Also I highly doubt the encryption is standard, it possible is random. Not
really sure
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ahah! thank you so much for your feedback ...
so do you think I should continue to look for it, or is it really a loss of
time ??
Well if you wish to waste your life away trying to reverse iriversable encryption go ahead. Even if you do manage to crack it YOU CAN'T display it in the Admin CP and you would have to spend a few more years posibly decades runing the cracking algorithum on it.
This document describes the MD5 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. It is conjectured that it is computationally infeasible to produce two messages having the same message digest, or to produce any message having a given prespecified target message digest
yep PPN is correct... md5 is not an encryption there is no way to decrypt (hence it is not an encryption / decryption function) md5 passwords... (at least not to my knowledge you can't undo the md5 function) and the passwords are stored as md5.... yes passwords can be obtained... but vb seems to have taken that function away as Smachol stated probably because of malice useage... regards...
Originally posted by Learner29 on my board, I had more than one person signing up with free email adresses such as hotmail and yahoo, only to spam the board with their filth.
Yes, I could ban the bad user, but he would have signed up with many many usernames, so when I ban one username he would enjoy relogging with another username and spreading his garbage again.