Blog Archives

Protect Your IP: Hashing Your Passwords

The legal system provides civil litigation as a means for vindicating IP rights that have been violated. But the best protection may lie in avoiding problems at the outset. Preventative self-help, you could call it. What you're looking at is not acutally database.

Passwords are a first line of defense for protecting intangibles—whether trade secrets, copyrighted materials or pre-patent information. Recently there’s been a spate of stories about password security breaches: LinkedIn, Yahoo Voices, others. Even well-known computer security companies, like RSA, are vulnerable to data breaches.

So it’s worth asking, how are passwords protected in the computers that store them? Read the rest of this entry

%d bloggers like this: