Skip to main content
15 votes

understanding sha512 hash in /etc/shadow

The first visible difference is that the /etc/shadow file represents the hash result in Base64 while the website returns it in hexadecimal (base-16). The same bytes can be written in several different ...
grawity's user avatar
  • 15.2k
9 votes

understanding sha512 hash in /etc/shadow

The standard library routine in C would be crypt(3). The second argument is the whole $6$NbmOz0kL4eKjJbwi string because that identifies the algorithm and the seed. eg // Compile with -lcrypt #...
Stephen Harris's user avatar
7 votes

understanding sha512 hash in /etc/shadow

You could use openssl's passwd subcommand: $ printf %s ron | openssl passwd -6 -salt NbmOz0kL4eKjJbwi -stdin $6$NbmOz0kL4eKjJbwi$JE1.19BxJWh7cbZjmPPDrviuBV7l7h/...
matja's user avatar
  • 171
2 votes

checking for strong passwords in Linux as an admin

is there some acceptable means [via software?] to validate all set passwords are in fact up to some standard of character length and complexity, without actually finding out the set password of an ...
Marcus Müller's user avatar
2 votes

checking for strong passwords in Linux as an admin

I can think of several ways to ensure all passwords meet standards: Intercept the password when the user is logging in and verify it, maybe pretend it is expired if it isn't good enough. (I'm not ...
user10489's user avatar
  • 10.9k
2 votes
Accepted

How do I enable root account = set root password in Synology DSM 7.2?

So, I just went through most of the search results, most claiming it is no longer possible, however it is still possible in 7.2 and maybe in later versions of DSM. Try this, just change the the ...
Vlastimil Burián's user avatar

Only top scored, non community-wiki answers of a minimum length are eligible