Multi One Password Changelog

What's new in Multi One Password 1.4

Dec 17, 2019
  • "Final Passwords" generated with 1 or more "Extra Salts" in older versions will be generated differently in this version!
  • "Extra Salts" SHA512 hashed strings are now generated from ("Default_Extra_Salt" + "Index_Number") instead from ("User_Unique_Password" + "Random Code" + "Index_Number")!
  • "Default_Extra_Salt" = ("User_Unique_Password" + "Random Code") hashed multiple times (based in the "Iterations" option) with SHA512 function!
  • See "z_ Final Passwords Generation Process.png" image file for more information!
  • The incompatibility mentioned above will probably not be a problem for no users at all because the tool uses "0" (zero) "Extra Salts" by default!
  • "Extra Salt" is an option that should be used in the future only, for example: (for Year 2120 _ Extra Salt = 1), (for Year 2220 _ Extra Salt = 2), etc!

New in Multi One Password 1.3 (Dec 17, 2019)

  • Each users data file will have its own random Default Configuration!
  • Users can manually EditChange Default Settings!

New in Multi One Password 1.2 (Dec 17, 2019)

  • "Length" option added:
  • Since "Final Password" length can be defined now, Hash Type "SHA512" should always be used!
  • "Extra Salt" option added:
  • ("Unique Passwords" are salted with extra SHA512 strings!)
  • The "Length" and "Extra Salt" options weren't really necessary, but since extreme advanced users asked for them, so they were added!
  • The good new is, the tool is now usable and safe even for the next Infinite years!

New in Multi One Password 1.1 (Oct 31, 2019)

  • Send" option added! (more secure than "Copy" option!)
  • "Iterations" option added!
  • now you can choose the computational power required for your "Final Passwords"
  • to be generated!
  • It could take 1 second, 5 seconds, 30 seconds, 1 minute, etc ...! (Well, it's
  • up to you to decide!)
  • The tool now generates larger "Random Codes"