mlibre2 Posted 19 hours ago Posted 19 hours ago Hey guys, I've been working lately on a project developed directly from my GitHub repository. I'm optimizing it as much as possible, minimizing false positives. Feel free to try it out with complete confidence 🤖 myLogin 🛡️
argumentum Posted 18 hours ago Posted 18 hours ago Func _getHash($sInput) $sHash = _Crypt_HashData($sInput, $CALG_SHA_512) $sInput = "" ; clear Return _Crypt_HashData($sHash, $CALG_MD5) ; 128-bit EndFunc Good 1st post, cool So..., why hash the hash, with a grater possibility of collision hash ? The 512 is good as is. What's the idea behind it ? Follow the link to my code contribution ( and other things too ). FAQ - Please Read Before Posting.
mlibre2 Posted 18 hours ago Author Posted 18 hours ago Thanks, yes, good observation, I'm aware of that, the purpose of why md5 is to make it shorter in case a parameter is used it tends to be very long if it wasn't. myLogin 🛡️
argumentum Posted 18 hours ago Posted 18 hours ago ...then use crc32, is even shorter I'd go with the 512. No one would ( haven't run the code, just looked at it in the browser ) brute force the login screen, quite unlikely. There is no reason to have to type a hash. You enter the password and if that's not it, ..that is not it. Anyway, if you press ctrl+alt+delete you can override the password, right ? Follow the link to my code contribution ( and other things too ). FAQ - Please Read Before Posting.
mlibre2 Posted 18 hours ago Author Posted 18 hours ago Ok, I'll keep that in mind, as for the key combination, I implemented a method that temporarily suspends the explorer without killing it, preventing you from opening the start menu, running commands from the task manager. argumentum 1 myLogin 🛡️
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now