Most applications with sound security standards hash passwords in databases such that the plaintext password may not be deduced given the hacker is granted access to the server\