Ovaj članak nije preveden ili je djelomično preveden.
Ako smatrate da ste ga sposobni prevesti, kliknite na opciju "Uredi" i prevedite ga vodeći računa o enciklopedijskom stilu pisanja i pravopisubosanskog jezika.
Ovaj šablon Vam daje način da kasnije potvrdite, da ste Vi osoba koja kontroliše Vaš korisnički nalog na dan, kada je šablon postavljen. Ovo je učinjeno postavljanjem koda (nazvanog "hash") na Vašu korisničku stranicu, tako da, u slučaju da je Vaš account kompromitovan, Vi možete uvjeriti nekoa drugog, da ste upravo Vi stvarna osoba koja koristi Vaše korisničko ime.
The intended use of this template is to help in the hopefully unlikely event that your account is compromised. If you published your real-life identity, then that identity could be used to reestablish contact with you if your account were compromised; keep in mind, in this scenario contact could not be established with you through your account, since it may be under the control of someone else. However, many Wikipedia users do not disclose their real-life identities, or disclose little enough of them that it may be difficult to establish their identity.
Ovo nije zamjena za imanje jakog pasvorda, niti za registrovanje email adrese za Vaš korisnički nalog. You should still do everything you can to prevent your account being compromised, including using a strong password and remembering to log yourself out when using a computer to which others may have access. If you have one, it may also be helpful to post your PGP public key. But even with the best of precautions, your account could become compromised, for instance, via a trojan horse or a brute-force attack on your password. This is intended to be a last resort.
Ideja je da se koristi kriptografski "hash"e (hash=sjeckano meso, haše); you choose a secret string known only to yourself, put it through a one-way hash function, and publish the result somewhere. It is infeasible to determine the secret string corresponding to the hash; hence, an attacker compromising an account presumably would not be able to supply the secret string.
Vaš tajni niz ne bi smio biti jednostavan za pogađanje. If your string is easy to guess, then the fact that you know the string is not likely to be very persuasive. For example, a string of 'joe' will be less convincing than 'My name is Joe Schmoe, and I can be contacted at: firstname.lastname@example.org; random bits:fFfwq0DuDmMXj8hYTM3NTKeDhk'
Your secret string should specify enough of your identity that, if the string were revealed, you could unambiguously prove you match that identity. For instance, your secret string could include a telephone number or email address at which you can be reached.
Try not to choose a secret string that represents your identity that could go completely out of date. So, for instance, it may be bad to choose a string that specifies only your telephone number as that number might change.
If you want to change your secret string, do so, but keep track of all your old secret strings. It is best to reveal all of them if you ever want to confirm your identity, as this will establish that you are the same person who used your account from the first moment the committed identity was published.
Your secret string should not be short. A dedicated attacker could, by brute force, try short strings until they find your secret string, but if your string is longer that attack would be impractical. If your string is 15 characters long, there are around 1027 strings of that length, or an octillion (and that's just counting alphanumeric strings with spaces).
Your secret string should not only contain an email address, name or phone number, but should contain hard to guess components. "email@example.com" for example may be vulnerable to both dictionary attacks and a search of email addresses, enabling attackers to check 'only' those hundred million names against all published hashed identities, which is computationally much easier than trying to identify a randomly chosen string.
Be sure to note the exact string you enter into the form, in case you need to use it later. It is important that this string be both easily remembered exactly by you and hard to guess or find by any intruder - if an intruder knows the secret string, then this scheme is useless and provides no security. One's username is public and trivially guessable; one's password is not a good choice either, as in the event of a compromised account, the password is likely to have been guessed.
On Unix-like operating systems the md5sum, sha1sum, sha224sum, sha256sum, sha384sum, and sha512sum programs are provided in the GNU Core Utilities. Windows users may use one of the methods mentioned below; those who have PowerShell installed can generate a hash using the following command. Provide your secret phrase in the location indicated:
To verify that you are correctly hashing your secret string, you can try hashing 'My name is Joe Schmoe, and I can be contacted at: firstname.lastname@example.org' (without the enclosing single-quotes). Your SHA-512 hash should be: