pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

The Ideal Password Length

The issue began on the password length, when there has been an announcement on the eBay administration that the fixed password they would be accepting is 20 characters. There are some speculations due to security defect. So, at this moment, let us dig the deeper cause of needing a lengthy password.

 

Algorithms on Hashing

A good example is the MD5, not so long ago, MD5 is known to be famous on hashing algorithms for web sites; Still, they experience secure algorithm when it comes to space in the following years. As larger companies processing large distributed networks on custom software, it is not that easy to upgrade the whole system to be able to use a new hashing algorithm. It may take months to years when modifying code to several systems.

 

Optimization of Software

When the software is in C language and it has a hash-passwords of variable length, can you know the length of the password? Using the C, the end string is usually defined by byte 0x00 or the null byte, the length of the string is known through an application that will count the string of each byte until it reach the null byte (and this is a slow process). To process these commands quickly, limiting the passwords to a specific length, so all the passwords are just equal or less than the length (with a pre-defined byte). For this, it only needs a fixed buffer length to handle it and will not worry about anything else.

When a software is stored in a database those plain-text passwords, a limit on the length is really needed, so it would be easier to manage and will increase in speed when every field of each row are in fixed-length.

 

Problem on Ape Condition

This situation is all about the 4 apes in a metal cage and banana hanging on a string from the roof. Whenever an ape pulls a banana, it triggers an electricity and shock all the apes. These apes will learn, that touching the banana will electrocute them. When you take one ape out of the cage and put a new ape inside the cage, the new ape will touch the banana and it will result in beating down from the other apes. If you continue to swap the apes, this goes on until none of the apes were there from the start. The result will be a group of apes beating those apes who touches the banana, although no one knows the real reason for it.

In the community of programmers this has the same pattern. Not so long ago, because of the hardware and software limitations, there were several reasons for passwords limitations and less reason to have long passwords. These reasons became unacceptable over time, however, some programming remain to practice the limits, for there are other people who still do it.

 

The Meaning of Alternate Security

There are people who have problem typing long password correctly, and this could happen. The credit card pin has a 4 digit pin, as you know, where many wouldn’t find hard time to type correctly. So if everyone has a limitation of 4 digit pin, there is a small chance of mistyping the security code. This is where the system allows to implement harsh security where 3 failed attempts can lock your account.

Take note that this type of security is carried out to systems that password hash database which have  little chance to be leaked or broken database will not compromise massive accounts.

 

Filed Under: Communications Tagged With: Password Length

Latest Articles

PicExa Viewer Removal Guide

Picexa Viewer is a program that can be downloaded from its own website or some of the free download sites found online. It is touted as being an image viewer that delivers fast results. But, the company behind this, Taiwan Shui Mu Chih Ching Technology Limited has a reputation for delivering suspect … [Read More...]

One-Click Operation of VHS Video to DVD Transfer Using ADVC-55

Once you have installed the ADVC-55 software, double-clicking the Let's CONVERT program icon causes a mini operating screen to appear above the Windows System Tray. This provides one-click control of tape to DVD conversions with the following functions: Specify where video is to be … [Read More...]

iStartSurf Virus Removal of Browser Hijacker

To have a browser hijacker in your computer is annoying enough, in addition to the harmful effects it can bring next. In case your search engine, home page and new tab page have been altered by iStartSurf hijacker, then removing this problem along with its associated malware can be … [Read More...]

Top Taplio Alternatives in 2025 : Why MagicPost Leads for LinkedIn Posting ?

LinkedIn has become a strong platform for professionals, creators, and businesses to establish authority, grow networks, and elicit engagement. Simple … [Read More...]

Shocking Cybercrime Statistics for 2025

People all over the world are becoming more concerned about cybercrime than ever. We have recently collected some statistics on this topic and … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

CrossFire Graphic Cards

Launched at Computex in the summer of 2005, ATI launched their own tandem graphics card solution, branded CrossFire, and … [Read More...]

AMD Sempron

In the summer of 2004, AMD announced the availability of its Sempron processor range. Initially positioned as the … [Read More...]

Merom – Intel’s mobile Core 2 Duo CPU technology guide

The announcement of the successor to the Intel Core Duo processor in the summer of 2006 also marked the reunification of Intel's desktop and … [Read More...]

[footer_backtotop]

Copyright © 2026 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors