DarkyAngel Posted July 2, 2012 Report Posted July 2, 2012 Cuprins:1 Preface1.1 Current State1.2 Moral Obligation2 Proper Hashing Methods2.1 Salt is good for you2.2 Key Derivation Functions2.2.1 PBKDF22.2.2 ARC4PBKDF22.2.3 bcrypt3 ConclusionReferences and Further ReadingDownload:http://www.exploit-db.com/wp-content/themes/exploit/docs/19454.pdf 2 Quote