pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

The Ideal Password Length

The issue began on the password length, when there has been an announcement on the eBay administration that the fixed password they would be accepting is 20 characters. There are some speculations due to security defect. So, at this moment, let us dig the deeper cause of needing a lengthy password.

 

Algorithms on Hashing

A good example is the MD5, not so long ago, MD5 is known to be famous on hashing algorithms for web sites; Still, they experience secure algorithm when it comes to space in the following years. As larger companies processing large distributed networks on custom software, it is not that easy to upgrade the whole system to be able to use a new hashing algorithm. It may take months to years when modifying code to several systems.

 

Optimization of Software

When the software is in C language and it has a hash-passwords of variable length, can you know the length of the password? Using the C, the end string is usually defined by byte 0x00 or the null byte, the length of the string is known through an application that will count the string of each byte until it reach the null byte (and this is a slow process). To process these commands quickly, limiting the passwords to a specific length, so all the passwords are just equal or less than the length (with a pre-defined byte). For this, it only needs a fixed buffer length to handle it and will not worry about anything else.

When a software is stored in a database those plain-text passwords, a limit on the length is really needed, so it would be easier to manage and will increase in speed when every field of each row are in fixed-length.

 

Problem on Ape Condition

This situation is all about the 4 apes in a metal cage and banana hanging on a string from the roof. Whenever an ape pulls a banana, it triggers an electricity and shock all the apes. These apes will learn, that touching the banana will electrocute them. When you take one ape out of the cage and put a new ape inside the cage, the new ape will touch the banana and it will result in beating down from the other apes. If you continue to swap the apes, this goes on until none of the apes were there from the start. The result will be a group of apes beating those apes who touches the banana, although no one knows the real reason for it.

In the community of programmers this has the same pattern. Not so long ago, because of the hardware and software limitations, there were several reasons for passwords limitations and less reason to have long passwords. These reasons became unacceptable over time, however, some programming remain to practice the limits, for there are other people who still do it.

 

The Meaning of Alternate Security

There are people who have problem typing long password correctly, and this could happen. The credit card pin has a 4 digit pin, as you know, where many wouldn’t find hard time to type correctly. So if everyone has a limitation of 4 digit pin, there is a small chance of mistyping the security code. This is where the system allows to implement harsh security where 3 failed attempts can lock your account.

Take note that this type of security is carried out to systems that password hash database which have  little chance to be leaked or broken database will not compromise massive accounts.

 

Filed Under: Communications Tagged With: Password Length

Latest Articles

Dual Independent Bus (DIB) – frontside and backside data bus CPU architecture

The Dual Independent Bus (DIB) architecture - first implemented in the Pentium Pro processor - was created to aid processor bus bandwidth. Having two (dual) independent buses enables the Pentium II processor to access data from either of its buses simultaneously and in parallel, rather than … [Read More...]

Palm Pilot

In 1996 Palm Computing, Inc. - then a part of US Robotics - led the resurgence of handheld computing with the introduction of its Pilot 1000 and Pilot 5000 organizers. Designed as companion products to personal computers, the devices … [Read More...]

Bestadblocker virus removal

Yes - Bestadblocker is malware.  By the name of the program you would think it would at least try and pretend to block ads but it provides in-line videos and tons of popups letting you know your computer is infected. It's this kind of adware that gives bundled software programs a bad name and why … [Read More...]

Top Taplio Alternatives in 2025 : Why MagicPost Leads for LinkedIn Posting ?

LinkedIn has become a strong platform for professionals, creators, and businesses to establish authority, grow networks, and elicit engagement. Simple … [Read More...]

Shocking Cybercrime Statistics for 2025

People all over the world are becoming more concerned about cybercrime than ever. We have recently collected some statistics on this topic and … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Utilize Google Trends for Business

Google Trends is a tool provided by Google that lets people see topics and subjects that are gaining in popularity online. It gives people the ability … [Read More...]

Search and Remove Folder on Computer

There are several options and methods for you to be able to search a programs, folders or files for different situations. You can search these by … [Read More...]

Transfer VHS to DVD Method

Transferring  a VHS tape  to a DVD sounds like something hard to do but in reality it's not.  It's basically taking what is on tape and converting it … [Read More...]

[footer_backtotop]

Copyright © 2026 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors