[DiscordArchive] Also, does 3.3.5 support flight points with different mounts based on faction, or was that a Cata th
[DiscordArchive] Also, does 3.3.5 support flight points with different mounts based on faction, or was that a Cata th
Archived author: <o> • Posted: 2022-04-16T11:32:12.292000+00:00
Original source
you might be right if there is some sibling relationship i have missed
Archived author: Snowcraft • Posted: 2022-04-16T11:32:23.608000+00:00
Original source
Mhm. Okay. I'll have to do a bunch of testing either way.
Archived author: Snowcraft • Posted: 2022-04-16T11:32:34.727000+00:00
Original source
But the Cartel factions all use 0 0.5
Archived author: Snowcraft • Posted: 2022-04-16T11:32:48.493000+00:00
Original source
So I'd assume the second of the two is siblings.
Archived author: L2S • Posted: 2022-04-16T11:35:20.236000+00:00
Original source
In my opinion if SHA hash passwords was somehow vulnerable or insecure then entire internet was offline... at least there are a lot of login systems without having a Two Factor authentication...
Archived author: <o> • Posted: 2022-04-16T11:36:29.886000+00:00
Original source
it is not a vulnerability with SHA, it is a vulnerability with hash storage. Dictionary attacks do not target weaknesses in the hash itself, it targets weaknesses in users passwords
Archived author: L2S • Posted: 2022-04-16T11:38:28.663000+00:00
Original source
more than that ... users are not even using Two factor, 3rd party login methods or etc... also there are voting sites with double or even triple Captcha systems lol... one simple login is more than enough for them.
Archived author: <o> • Posted: 2022-04-16T11:39:34.982000+00:00
Original source
proper srp6 does not complicate the login process for the user
Archived author: L2S • Posted: 2022-04-16T11:39:58.013000+00:00
Original source
ik.. same fields username and pass
Archived author: <o> • Posted: 2022-04-16T11:40:05.417000+00:00
Original source
it's still just a password, the protocol itself strips the equivalence from anything sent to the server