This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Talk:.NET Security Cheat Sheet"

From OWASP
Jump to: navigation, search
Line 3: Line 3:
  
 
As this goes into public beta, please add examples and samples. Much of this guidance is just a stub. Please fill things out as you have the availability! Remember, anyone with an account can attribute. If you want to be more anonymous, please email me and I'll make adjustments. [[User:Bill Sempf|Bill Sempf]] 02:53, 5 April 2013 (UTC)
 
As this goes into public beta, please add examples and samples. Much of this guidance is just a stub. Please fill things out as you have the availability! Remember, anyone with an account can attribute. If you want to be more anonymous, please email me and I'll make adjustments. [[User:Bill Sempf|Bill Sempf]] 02:53, 5 April 2013 (UTC)
 +
 +
In the [https://www.owasp.org/index.php/.NET_Security_Cheat_Sheet#Encryption Encryption section] of the page, there's a bullet that mentions that SHA512 is the strongest hashing algorithm in the framework.  While this is certainly true for some uses of hashing (not password hashing, which I've added another bullet to cover) would it be useful to add more detail to what you might want to use SHA-512 for?
 +
--[[User:Xandersherry|Xandersherry]] ([[User talk:Xandersherry|talk]]) 16:03, 19 November 2014 (CST)

Revision as of 22:03, 19 November 2014

This is a work in progress. Comments welcome. Bill Sempf 01:02, 15 February 2013 (UTC)

As this goes into public beta, please add examples and samples. Much of this guidance is just a stub. Please fill things out as you have the availability! Remember, anyone with an account can attribute. If you want to be more anonymous, please email me and I'll make adjustments. Bill Sempf 02:53, 5 April 2013 (UTC)

In the Encryption section of the page, there's a bullet that mentions that SHA512 is the strongest hashing algorithm in the framework. While this is certainly true for some uses of hashing (not password hashing, which I've added another bullet to cover) would it be useful to add more detail to what you might want to use SHA-512 for? --Xandersherry (talk) 16:03, 19 November 2014 (CST)