Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <v56t4u$3quo7$3@dont-email.me>
Deutsch   English   Français   Italiano  
<v56t4u$3quo7$3@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Rich <rich@example.invalid>
Newsgroups: sci.crypt
Subject: Re: Speaking of long-ish passwords
Date: Sat, 22 Jun 2024 16:12:14 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 17
Message-ID: <v56t4u$3quo7$3@dont-email.me>
References: <FKXcO.332464$ujOb.302447@fx16.ams4> <v51jpr$2kvgs$2@dont-email.me> <qe5dO.139761$2RJ6.85607@fx05.ams4> <v52np1$2uvck$2@dont-email.me> <VD5dO.139762$2RJ6.117477@fx05.ams4> <v52t0l$3022a$1@dont-email.me> <jzjdO.86399$bHO6.65183@fx06.ams4> <v54nvb$3b20l$1@dont-email.me> <v563fp$3m80k$1@dont-email.me> <v56bpt$3nrg5$1@dont-email.me>
Injection-Date: Sat, 22 Jun 2024 18:12:15 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="43a00a6c9df3184c62368e08b74e19b2";
	logging-data="4029191"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1+58ttASnkmF1skObnBn3cQ"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:Xv/s4eFeO+mUpMTMmj4EzlZGPs4=
Bytes: 1854

Oscar <oxxxxxxxxxxxs@gmail.com> wrote:
> Op 22-6-2024 om 10:54 schreef Richard Harnden:
>> On 21/06/2024 21:31, Chris M. Thomasson wrote:
>>> ... generating a
>>> complex password from a simple password...
>> 
>> You can't actually increase the entropy
>> 
> 
> Perhaps, but the recent discussions here seem to boil down to "password 
> based key derivation functions" which may frustrate bruteforce attacks a 
> bit.

The thread has kind of drifted in that direction.  It began as a way to 
try to "remember" a complex password by encoding it as "something else" 
such that one might not need to worry should the stazi examine your 
papers and find the "something else" in your possession.