<small id='cteli'></small><noframes id='cteli'>

  • <i id='cteli'><tr id='cteli'><dt id='cteli'><q id='cteli'><span id='cteli'><b id='cteli'><form id='cteli'><ins id='cteli'></ins><ul id='cteli'></ul><sub id='cteli'></sub></form><legend id='cteli'></legend><bdo id='cteli'><pre id='cteli'><center id='cteli'></center></pre></bdo></b><th id='cteli'></th></span></q></dt></tr></i><div id='cteli'><tfoot id='cteli'></tfoot><dl id='cteli'><fieldset id='cteli'></fieldset></dl></div>
      <bdo id='cteli'></bdo><ul id='cteli'></ul>
    1. <legend id='cteli'><style id='cteli'><dir id='cteli'><q id='cteli'></q></dir></style></legend>

        <tfoot id='cteli'></tfoot>

        如何从 SQL Server 解密密码?

        How to decrypt a password from SQL server?(如何从 SQL Server 解密密码?)
          <tbody id='sDnMb'></tbody>
        • <i id='sDnMb'><tr id='sDnMb'><dt id='sDnMb'><q id='sDnMb'><span id='sDnMb'><b id='sDnMb'><form id='sDnMb'><ins id='sDnMb'></ins><ul id='sDnMb'></ul><sub id='sDnMb'></sub></form><legend id='sDnMb'></legend><bdo id='sDnMb'><pre id='sDnMb'><center id='sDnMb'></center></pre></bdo></b><th id='sDnMb'></th></span></q></dt></tr></i><div id='sDnMb'><tfoot id='sDnMb'></tfoot><dl id='sDnMb'><fieldset id='sDnMb'></fieldset></dl></div>
          <tfoot id='sDnMb'></tfoot>
          <legend id='sDnMb'><style id='sDnMb'><dir id='sDnMb'><q id='sDnMb'></q></dir></style></legend>

          1. <small id='sDnMb'></small><noframes id='sDnMb'>

              • <bdo id='sDnMb'></bdo><ul id='sDnMb'></ul>

                  本文介绍了如何从 SQL Server 解密密码?的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着跟版网的小编来一起学习吧!

                  问题描述

                  我在 sql server 2000 中有这个查询:

                  select pwdencrypt('AAAA')

                  输出一个加密的AAAA"字符串:

                  <前>0x0100CF465B7B12625EF019E157120D58DD46569AC7BF4118455D12625EF019E157120D58DD46569AC7BF4118455D

                  如何从其来源(即AAAA")转换(解密)输出?

                  解决方案

                  我相信 pwdencrypt 正在使用散列,因此您无法真正反转散列的字符串 - 该算法的设计是不可能的.

                  如果您要验证用户输入的密码,通常的技术是对其进行散列,然后将其与数据库中的散列版本进行比较.

                  这是验证用户输入表的方法

                  SELECT password_field FROM mytable WHERE password_field=pwdencrypt(userEnteredValue)

                  用(大惊喜)用户输入的值替换 userEnteredValue :)

                  I have this query in sql server 2000:

                  select pwdencrypt('AAAA')
                  

                  which outputs an encrypted string of 'AAAA':

                  0x0100CF465B7B12625EF019E157120D58DD46569AC7BF4118455D12625EF019E157120D58DD46569AC7BF4118455D
                  

                  How can I convert (decrypt) the output from its origin (which is 'AAAA')?

                  解决方案

                  I believe pwdencrypt is using a hash so you cannot really reverse the hashed string - the algorithm is designed so it's impossible.

                  If you are verifying the password that a user entered the usual technique is to hash it and then compare it to the hashed version in the database.

                  This is how you could verify a usered entered table

                  SELECT password_field FROM mytable WHERE password_field=pwdencrypt(userEnteredValue)
                  

                  Replace userEnteredValue with (big surprise) the value that the user entered :)

                  这篇关于如何从 SQL Server 解密密码?的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持跟版网!

                  本站部分内容来源互联网,如果有图片或者内容侵犯了您的权益,请联系我们,我们会在确认后第一时间进行删除!

                  相关文档推荐

                  Maximum stored procedure, function, trigger, or view nesting level exceeded (limit 32)(超出最大存储过程、函数、触发器或视图嵌套级别(限制 32))
                  How to debug stored procedure in VS 2015?(如何在 VS 2015 中调试存储过程?)
                  How to find a text inside SQL Server procedures / triggers?(如何在 SQL Server 程序/触发器中查找文本?)
                  SQL Server stored procedure return code oddity(SQL Server 存储过程返回码奇怪)
                  Conditional SQL ORDER BY ASC/DESC for alpha columns(alpha 列的条件 SQL ORDER BY ASC/DESC)
                  Export stored procedure result set to Excel in SSMS(在SSMS中将存储过程结果集导出到Excel)
                1. <tfoot id='uqKQG'></tfoot>
                2. <i id='uqKQG'><tr id='uqKQG'><dt id='uqKQG'><q id='uqKQG'><span id='uqKQG'><b id='uqKQG'><form id='uqKQG'><ins id='uqKQG'></ins><ul id='uqKQG'></ul><sub id='uqKQG'></sub></form><legend id='uqKQG'></legend><bdo id='uqKQG'><pre id='uqKQG'><center id='uqKQG'></center></pre></bdo></b><th id='uqKQG'></th></span></q></dt></tr></i><div id='uqKQG'><tfoot id='uqKQG'></tfoot><dl id='uqKQG'><fieldset id='uqKQG'></fieldset></dl></div>
                  <legend id='uqKQG'><style id='uqKQG'><dir id='uqKQG'><q id='uqKQG'></q></dir></style></legend>
                    • <bdo id='uqKQG'></bdo><ul id='uqKQG'></ul>
                        <tbody id='uqKQG'></tbody>

                        • <small id='uqKQG'></small><noframes id='uqKQG'>