Unnamed repository; edit this file 'description' to name the repository.
Log | Files | Refs | README

commit 79ff93eb7018762eb9820ad04074315d71e57f61
parent 269634a225784fa8a6f563b6b93e260b9ffe3638
Author: Jackson G. Kaindume <>
Date:   Thu, 18 Aug 2022 13:07:09 +0200


Mdoc/ | 4++--
1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/doc/ b/doc/ @@ -19,8 +19,8 @@ users password with a [__hash function__]( There are lots of hash functions that can be used, but most of these will be a bad idea to use. For example if you use SHA-256 or other -computationally cheap (hash function without a __work factor__ -parameter) functions, they are vulnerable to rainbow table attacks. +computationally cheap functions (hash function without a __work factor__ +parameter), they are vulnerable to rainbow table attacks. Bruteforce is also possible if the password length is short/known, asic miners can generate 100 TeraHashes PER Second.