pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

The Ideal Password Length

The issue began on the password length, when there has been an announcement on the eBay administration that the fixed password they would be accepting is 20 characters. There are some speculations due to security defect. So, at this moment, let us dig the deeper cause of needing a lengthy password.

 

Algorithms on Hashing

A good example is the MD5, not so long ago, MD5 is known to be famous on hashing algorithms for web sites; Still, they experience secure algorithm when it comes to space in the following years. As larger companies processing large distributed networks on custom software, it is not that easy to upgrade the whole system to be able to use a new hashing algorithm. It may take months to years when modifying code to several systems.

 

Optimization of Software

When the software is in C language and it has a hash-passwords of variable length, can you know the length of the password? Using the C, the end string is usually defined by byte 0x00 or the null byte, the length of the string is known through an application that will count the string of each byte until it reach the null byte (and this is a slow process). To process these commands quickly, limiting the passwords to a specific length, so all the passwords are just equal or less than the length (with a pre-defined byte). For this, it only needs a fixed buffer length to handle it and will not worry about anything else.

When a software is stored in a database those plain-text passwords, a limit on the length is really needed, so it would be easier to manage and will increase in speed when every field of each row are in fixed-length.

 

Problem on Ape Condition

This situation is all about the 4 apes in a metal cage and banana hanging on a string from the roof. Whenever an ape pulls a banana, it triggers an electricity and shock all the apes. These apes will learn, that touching the banana will electrocute them. When you take one ape out of the cage and put a new ape inside the cage, the new ape will touch the banana and it will result in beating down from the other apes. If you continue to swap the apes, this goes on until none of the apes were there from the start. The result will be a group of apes beating those apes who touches the banana, although no one knows the real reason for it.

In the community of programmers this has the same pattern. Not so long ago, because of the hardware and software limitations, there were several reasons for passwords limitations and less reason to have long passwords. These reasons became unacceptable over time, however, some programming remain to practice the limits, for there are other people who still do it.

 

The Meaning of Alternate Security

There are people who have problem typing long password correctly, and this could happen. The credit card pin has a 4 digit pin, as you know, where many wouldn’t find hard time to type correctly. So if everyone has a limitation of 4 digit pin, there is a small chance of mistyping the security code. This is where the system allows to implement harsh security where 3 failed attempts can lock your account.

Take note that this type of security is carried out to systems that password hash database which have  little chance to be leaked or broken database will not compromise massive accounts.

 

Filed Under: Communications Tagged With: Password Length

Latest Articles

Flat panel displays for mobile computers – laptops, notebooks and netbooks

In the portable arena the dramatic weight, size and power consumption benefits of LCD technology has, for several years, outweighed their relative high cost. By the late 1990s notebook screen sizes had topped out at around 15in and two designs had achieved a position of dominance over … [Read More...]

Lesson’s Learned from the Ashley Madison Hack

The most recent hack to make the headlines is the Ashley Madison hack. It is making news mainly because of the sensational nature of the sight to begin with and the sordid details that are available regarding its membership base. However, there are some lessons to be learned regarding security for … [Read More...]

Object Oriented Programming 3

Encapsulation From what we've covered so far we can suggest that: A class is an abstract data type made up of a combination of the relevant data and associated methods. Each class not only has specific data members, it also has it's member functions or methods. The methods are the tasks … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Redditors Talk About the Impact of AI on Freelance Writers

AI technology has had a huge impact on our lives. A 2023 survey by Pew Research found that 56% of people use AI at least once a day or once a week. … [Read More...]

11 Most Popular Books on Perl Programming

Perl is not the most popular programming language. It has only one million users, compared to 12 million that use Python. However, it has a lot of … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

How To Reboot Your Home Network

There comes a time when you are using your home network that it can become unresponsive. When it gets to that point, one of the best things to do is … [Read More...]

Pentium Processor Numbers

For a number of years years, CPU development had seen a shift towards delivering broader enhancements to the PC platform … [Read More...]

Ensure your IT is Ready for 2016

With the holidays around the corner, 2016 will be here sooner than you know it. This makes it an excellent time to start thinking about next year’s IT … [Read More...]

[footer_backtotop]

Copyright © 2025 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors