A random, long password which uses no dictionary words, such as "88a7da62429ba6ad3cb3c76a09641fc" would take a brute force attacker millions of hours to crack.A 'salt is used to further enhance the security of the generated result.
If you manage your own web server or hosting account, you will have this information as a result of creating the database and user.
Important: Never use a word processor like Microsoft Word or Google Docs for editing Word Press files! The values here are examples to show you what to do.
Do not change these details here by editing this page, change them on your web server.
If you make changes here by using the edit button, they will not work and you will be showing your password details to the world.// ** My SQL settings - You can get this info from your web host ** // /** The name of the database for Word Press */ define( 'DB_NAME', 'database_name_here' ); /** My SQL database username */ define( 'DB_USER', 'username_here' ); /** My SQL database password */ define( 'DB_PASSWORD', 'password_here' ); /** My SQL hostname */ define( 'DB_HOST', 'localhost' ); Replace /var/run/mysqld/with the socket or pipe information provided by your host.
You can change these at any point in time to invalidate all existing cookies.