Search results
Results From The WOW.Com Content Network
Bot passwords allow access to a user account via the API without using the account's main login credentials. The user rights available when logged in with a bot password may be restricted. If you don't know why you might want to do this, you should probably not do it. No one should ever ask you to generate one of these and give it to them.
Main page; Contents; Current events; Random article; About Wikipedia; Contact us; Pages for logged out editors learn more
A random password generator is a software program or hardware device that takes input from a random or pseudo-random number generator and automatically generates a password. Random passwords can be generated manually, using simple sources of randomness such as dice or coins , or they can be generated using a computer.
Once the bot has been approved and given its bot flag permission, one can add "bot=True" to the API call - see mw:API:Edit#Parameters in order to hide the bot's edits in Special:RecentChanges. In Python, using either mwclient or wikitools, then adding bot=True to the edit/save command will set the edit as a bot edit - e.g. PageObject.edit(text ...
The user rights available when logged in with a bot password may be restricted. Sounds a bit scary, right? It's not, so let's get you set up: Log on with the account you want to set this up for and head to Special:BotPasswords; Create a new "Bot", called "AWB" Bot name: AWB; Click `Create` Make a note of the `Username` - for example Bob@AWB
The PBKDF2 key derivation function has five input parameters: [9] DK = PBKDF2(PRF, Password, Salt, c, dkLen) where: PRF is a pseudorandom function of two parameters with output length hLen (e.g., a keyed HMAC)
Wikipedia:Bots/Requests for approval to ask for permission to run a bot; Wikipedia:Bot requests to request that someone write a bot to do something. Text and/or other creative content from this version of Wikipedia:Creating a bot was copied or moved into mw:Manual:Creating a bot with this edit on 18:56, 11 October 2014 (UTC).
For example, bcrypt cannot be used to derive a 512-bit key from a password. At the same time, algorithms like pbkdf2, scrypt, and argon2 are password-based key derivation functions - where the output is then used for the purpose of password hashing rather than just key derivation. Password hashing generally needs to complete < 1000 ms.