How to display hashing algorithm on your Linux system for user authentication

  • $1 = MD5 hashing algorithm
  • $2 = Blowfish algorithm is in use
  • $2a = Eksblowfish algorithm
  • $5 = SHA-256 algorithm
  • $6 = SHA-512 algorithm




Just a Dev (

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

A.I. tech trialled during Exercise Formidable Shield

HMS Lancaster (left), HMS Dragon (middle) and HMS Argyll (right), seen here off Scotland’s Outer Hebrides and Norway’s Arctic coast as part of Exercise Formidable Shield 2021.

On millions of Android phones, a modem weakness might enable hackers to listen in on your calls.

checklist TryHackMe

something useful

What the experts have to say about GDPR visitor sign-in: Paper vs digital


Why is it good to look back at your older iOS application builds?

{UPDATE} The Lost Hope Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Jean-Nicolas Boulay

Jean-Nicolas Boulay

Just a Dev (

More from Medium

How to Build OpenSSL, zlib, and cURL Libraries on Linux

ngrok — Make full use of free tier version to expose your localhost to the internet

Setup Samsung ML-3312ND Printer on Debian10

DockerCon2022 Key Takeaways: Docker And WebAssembly