Figure 1

« 
Previous
|
|
Next
 »

Figure 1: If an attacker has access to the database, they will only see cryptic hash. In this example, PhpMyAdmin shows the Joomla Content Management System, which uses the MD5 approach with a salt.

Powered by eZ Publish™ CMS Open Source Web Content Management. Copyright © 1999-2014 eZ Systems AS (except where otherwise noted). All rights reserved.