answersLogoWhite

0

Normally, recorded passwords are hashed, not kept as they are written. When a user logs in, their password is hashed with the same algorithm used as the recorded ones, and the match is made. That way, if the database is hacked, in theory, the hacker still doesn't have usable passwords.

User Avatar

Wiki User

11y ago

What else can I help you with?

Related Questions

What is an oracle account?

Oracle is the name of a database, I would guess it is an account (username/password) on that database.


Is the password database used for authentication always located on the local computer?

no


What is connection in database?

Connection is the process of linking your website or web application to the mysql database. So it cannot be a data within the database. The login & password or Signup details can be part of the database but not the connection.


Can you get your medical records online?

If your hospital has your records in a database, you can access them by the help of your password.


How do you install WordPress in a cPanel Environment?

If your hosting provider supplies the cPanel hosting control panel, you may follow these simple instructions to create your WordPress username and database. A more complete set of instructions for using cPanel to create the database and user can be found in Using cPanel. Log in to your cPanel. Click MySQL Database Wizard icon under the Databases section. In Step 1. Create a Database enter the database name and click Next Step. In Step 2. Create Database Users enter the database user name and the password. Make sure to use a strong password. Click Create User. In Step 3. Add User to Database click the All Privileges checkbox and click Next Step. In Step 4. Complete the task note the database name and user. Write down the values of hostname, username, databasename, and the password you chose. (Note that hostname will usually be localhost.)


What is the username and password for Oracle 9i?

You need to ask the DBA (Database Administrator) for that information.


What is a DSN used for?

A DSN (Data Source Name) is used to connect an application to a database by defining the database connection parameters such as server location, database name, username, and password. It helps manage and streamline database connections within an application.


What is the highest level of security during login?

During login to any account authentication is used. In authentication the user password is matched with the password in the database.


How do you run a MySQL query from PHP file?

Here is a simple script that you can do to run a MySQL query after you have set a database up. <?php // Database Settings $db['hostname'] = "localhost"; $db['username'] = "<db username>"; $db['password'] = "<db password>"; $db['database'] = "<db name>"; // Connect to MySQL $connect = mysql_connect($db['hostname'], $db['username'], $db['password']); // Select Database mysql_select_db($db['database'], $connect); // Do MySQL Query mysql_query("INSERT INTO table_name SET field_name = '1234567890'"); // Close MySQL mysql_close($connect); ?> Obviously you will need to use your own MySQL settings and database details, but this gives you a general overview of how you can do it.


Can you password protect an access database?

Yes, but you must follow specific procedures when opening the database you want to protect. See related links for screen shots and details about how to protect an Access 2007 database. Of course, you always could use one of dozens of commercial applications to encrypt and password protect any file on your computer.


What is database all about?

HiDatabase like Mysql or access are for store dataExample anwsers.com have database who store all question and answer and user login and password with this when you login the webpage look if your information are correct and webpage get question and answer from database and display it


Why would a person need to know the NOD32 password?

The software NOD32 requires a valid username and password for updating the virus database. This means that without a password and username, the software cannot provide complete security.