Talk:LAN Manager
This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||
|
The contents of the LM hash page were merged into LAN Manager on 11 February 2017. For the contribution history and old versions of the redirected page, please see its history; for the discussion at that location, see its talk page. |
Merger with LM hash proposal
[edit]The LM hash algorithm is the cryptographic algorithm used by LANMAN. Most of "LM hash" deals with its cryptanalysis and "LAN Manager" has a duplicate summary of the security vulnerability.
Both articles are small enough to be merged and since it is old technology they probably wont expand too much. The merger will also maintain consistency with NT LAN Manager since the protocol and its algorithms can all be found on the same page. I think that's what we should do here. --M4t3uz (talk) 13:48, 16 April 2014 (UTC)
It seems LM Hash is also used with Windows 7 maybe newer OSs. Should be mentioned in the article. http://digital-forensics.sans.org/blog/2012/02/29/protecting-privileged-domain-accounts-lm-hashes-the-good-the-bad-and-the-ugly--193.100.62.29 (talk) 14:14, 3 November 2014 (UTC)
Effective strength
[edit]“This makes the effective strength of a 14-characters password equal to only , or twice that of a 7-character password”
How do you get ? Shouldn’t that be ? Which still is far from the true strength because of the case folding. 2001:14BB:140:189C:69BC:585C:711C:AD15 (talk) 11:11, 17 July 2018 (UTC)
- Start-Class Computing articles
- Low-importance Computing articles
- Start-Class Computer networking articles
- Low-importance Computer networking articles
- Start-Class Computer networking articles of Low-importance
- All Computer networking articles
- Start-Class software articles
- Low-importance software articles
- Start-Class software articles of Low-importance
- All Software articles
- Start-Class Computer Security articles
- Low-importance Computer Security articles
- Start-Class Computer Security articles of Low-importance
- All Computer Security articles
- All Computing articles