hello hawkee this is my alias of a password maker i also include a non alias for other users to use
commands for the alias
ok
_ _
| | | |
_ __ ___ __ _| | _____ _ __ __ _ ___ _____ _____ _ __ __| |
| '_ ` _ \ / _` | |/ / _ \ | '_ \ / _` / __/ __\ \ /\ / / _ \| '__/ _` |
| | | | | | (_| | < __/ | |_) | (_| \__ \__ \\ V V / (_) | | | (_| |
|_| |_| |_|\__,_|_|\_\___| | .__/ \__,_|___/___/ \_/\_/ \___/|_| \__,_|
| |
|_|
=====================================================================
on 1:TEXT:*!mkpass*:#:{
notice $nick $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9)
}
====================alias version========================
alias mkpass {
msg $chan $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9) $+ $rand(a,z) $+ $rand(A,Z) $+ $rand(0,9)
}
well really, a 40 character password following the pattern described would still require, in the worst case, 6.156e+50 guesses - a number far greater than anything our technology is capable of handling in any realistic amount of time. still many orders of magnitude less than the latter, so for smaller passwords you're quite right to draw a distinction.
also, these wouldn't be referred to as 'layers of security' :P
You should really adapt this version below and improve your code with some consideration that you do not want to get trigger flooded and have the incoming message stripped out of control codes:
on *:text:$($iif(!mkpass = $strip($1),$1)):#:if !%t { inc -u5 %t | mkpass }
alias mkpass { $iif($event = text,notice $nick,msg #) $&
$regsubex($str(.,40),/./g,$gettok($r(a,z) $r(0,9) $r(A,Z),$r(1,3),32))
}
Your current code is 1174 bytes without the
"====================alias version========================"
The suggested one is only 202 bytes.
@ jethro a password like this a@cD(f2H ( 8 characters ) r enough to get this password you need 117 years to hack with the right software, this password aBcDeFgHiJ ( 10 characters )
can b hacked in 4700 years lolz :p
i don't know about you but i think i'm not going to live that long xD
so 10 characters would b enough if u ask me.
Also, marcs-rock, you don't need to repeat the routine for both the event and alias. You can do it with a single one:
on 1:TEXT:!mkpass:#:mkpass
alias mkpass {
$iif($event = text,notice $nick,msg #) ;code to randomize password goes here
}
This will let you have both ways.
Again, I'm still baffled as to why you want to have the alias trigger and send a message to the channel where everybody will be able to see the password being generated.
using you regsubex way
4g0b20M02ED]99e\f86FWG6JKWB3IR516571iw69
Hu72AA5472X5i8123zTF9MW4N
Ln7054I87v[3M
C65]Y5C56Qs74djsDPs5\838D66[86w87\5ju09F
EY49w12341W8i6U5XM[597Ue1xBo9SU10iH5Ul\u
1F72xhp^n0160E5c^K426Z44WN88X0Zd5tU88B45
look especial characters like [ \ ^ , ppl cant use this as password
now using a,z
t3055698b95he0l1rdxaa80h9u3n9wjk750nm96k
wd33c664n4wed2853821440m5c0arjd7sv5kump8
nap50cidkp3oonmwe8qh3jva8h9n7q5w1bir0m6u
nbl77z85j9pb06ve0e214cch76q8e2prgqdyfi0y