/balk/

sports edition

old

Attached: 1435888886154.jpg (630x340, 35K)

Other urls found in this thread:

youtube.com/watch?v=teA8TE092ss
html5.haxball.com/?c=HbX7A3YXIf4&p=1
youtube.com/watch?v=peqbzVjvFzU
html5.haxball.com/?c=wMz951KOdrs&p=1
youtube.com/watch?v=fvZdBVfE62U
instagram.com/p/Bg2Ev4LhC3u/?igref=ogexp&utm_source=fb_www_attr
twitter.com/NSFWRedditImage

irreversible doesn't mean uncrackable
it all depends on the hashing algo used + the complexity of the password
hashing obfuscates password, while the complexity of the password makes it "hard to be guessed"
for example, 123456 is not safe even using the strongest hashing because is easy to predict, it's in every dictionary and has O(6^6) or something (6 symbols with 6 iterations each)
another example is fag2018banana3 is also weak, due to the usage of actual words and relatively small keyspace
and in the end, it's all about the execution time of the hashing algo
for example, message digest 4 (MD4) was surpassed by MD5 because it was "too fast", thus it takes less time to bruteforce a hash
nowadays plain MD5 is considered as weak because new GPUs cracks it pretty easy (to some length, of course)
and it's true, because these days i had to brute few thousand hashes and a keyspace of a-z0-9 and length 8 took me couple of hours or something with my meme GTX1070 GPU, while back in 2007 doing the same was taking me weeks
so what devs usually do today is to "salt" the passwords

I call this bullshit claim

Attached: being_cool.png (500x280, 102K)

pozdrav
youtube.com/watch?v=teA8TE092ss

html5.haxball.com/?c=HbX7A3YXIf4&p=1

pass: optic

youtube.com/watch?v=peqbzVjvFzU
trqbva da se saberem na rakia tbqh

Attached: >optic.png (115x127, 4K)

...

apetitno

evening lads
long day 2day

Attached: >optic.png (116x136, 3K)