antcollinet
Grand Contributor
The way passwords are often stored on a system is as a one way encrypted hash number.Ok, so a fastasfuch computer can create a list of passwords that includes your password in a nanosecond.
How does it figure out which of the gazillion passwords in the list it created is the one you are using for some purpose?
You enter the password, the algorithm converts it to a hash, and if the hash matches you are allowed in.
When a site is hacked it is possible all the hashes are also obtained by the hackers. In this case, they can (off line, and as fast as their computer can do it) brute force to find out what passwords match to the hashes they have. Once they find a match, they can get into that account. Simple passwords are cracked in this way very quickly, they can gain access to all the accounts with simple passwords on the hacked site within hours, or even minutes. And then retry those email password combinations on many other sites.
Last edited: