this tool would be able to decrypt the sha1 hash strings from your other table as well.
any type of security is going to have people trying to defeat it, same goes for encryption methods.
like i said in my initial response, SHA1 is only one encryption method offered.
the crypt encryption method uses a salt string which would need to be known in order to decrypt the hash.