!!!Overview
[{$pagename}] is a non-secret, random value that's used to ensure that the same [message] (often a [Password]) will not consistently [hash] to the same output value.[1]

[{$pagename}] is typically used to prevent precomputation attacks such as [Rainbow Tables] or dictionary attacks.

[{$pagename}] is generally appended to the clear-text password, which is the encoded using the desired message digest algorithm, and then the clear-text [{$pagename}] is appended to the message digest and the resulting value is [Base64].  This makes it possible to determine what the salt was so that it can be used to determine whether a user-supplied password is correct.

The [Crypt] uses a relatively weak 12-bit [{$pagename}], which means that there are only 4096 ways of encoding any value.  This is a relatively low number, and therefore it is possible to construct dictionaries of every possible encoding for a wide range of values for use in breaking user passwords.  Other [Password Storage Scheme] in OpenDS use a 64-bit [{$pagename}] which provide 18446744073709551616 different ways of encoding any one value.

!! If you [{$pagename}]
[Salted Password Hashing - Doing it Right|https://crackstation.net/hashing-security.htm|target='_blank'] [2]

!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [What is the difference between hash salting and noncing?|https://stackoverflow.com/a/8176717/88122|target='_blank'] - based on information obtained 2016-10-28 
* [#2] - [Salted Password Hashing - Doing it Right|https://crackstation.net/hashing-security.htm|target='_blank'] - based on information obtained 2016-10-28