uncleflo

profile picture

Some cool dude. Higher order of decision making. Absolute.

Registered since September 28th, 2017

Has a total of 4246 bookmarks.

Showing top Tags within 19 bookmarks

howto   information   development   guide   reference   administration   design   website   software   solution   service   product   online   business   uk   tool   company   linux   code   server   system   application   web   list   video   marine   create   data   experience   description   tutorial   explanation   technology   build   blog   article   learn   world   project   boat   download   windows   security   lookup   free   performance   javascript   technical   network   control   beautiful   support   london   tools   course   file   research   purchase   library   programming   image   youtube   example   php   construction   html   opensource   quality   install   community   computer   profile   feature   power   browser   music   platform   mobile   work   user   process   database   share   manage   hardware   professional   buy   industry   internet   dance   advice   installation   developer   3d   camera   search   access   customer   travel   material   test   standard   review   documentation   css   money   engineering   engine   develop   webdesign   device   photography   digital   api   speed   source   management   program   phone   discussion   question   event   client   story   simple   water   marketing   app   content   yacht   setup   package   fast   idea   interface   account   communication   cheap   compare   script   study   market   live   easy   google   resource   operation   startup   monitor   training  


Tag selected: password.

Clear all

Showing 19 results.

Looking up password tag. Showing 19 results. Clear

Headless Raspberry Pi setup with wifi :: Styxit blog

https://styxit.com/2017/03/14/headless-raspberry-setup.html

Saved by uncleflo on August 1st, 2019.

This article will get you up and running with a Raspberry Pi, connected to your wifi network and accessible over ssh, without ever needing to connect anything to it, besides power. After flashing the image to the SD card, the drive has been ejected. Disconnect and connect the SD card so it gets detected by macOS again. A boot drive should appear. Open a terminal window and cd to the boot drive using the following command:

raspberry pi boot sd ethernet connect ping password pixel verify click enable file setup keyboard extract desktop maybe card image chip update command power wifi connection howto ssh flash arm automatic drive detect network blog developer administration


Create a Database User - SQL Server | Microsoft Docs

https://docs.microsoft.com/en-us/sql/relational-databases/security/authentication-access/create-a-database-user?view=sql-server-2017

Saved by uncleflo on May 4th, 2019.

This topic describes how to create the most common types of database users. There are eleven type of users. The complete list is provided in the topic CREATE USER (Transact-SQL). All varieties of SQL Server support database users, but not necessarily all types of users. You can create a database user by using SQL Server Management Studio or by using Transact-SQL.

authenticate database password user schema folder authentication server select query containment specify feedback certificate connect execute confirm windows transaction manage studio microsoft sqlserver type description variety support topic access privilege


ZOOK Email Backup Software - Best Way to Take Email Backup to Webmail

https://www.zooksoftware.com/email/backup/

Saved by uncleflo on April 28th, 2019.

Best Email Backup Tool to Archive Emails of 85+ Email Applications. Take Backup of Webmail, Cloud Mail, cPanel & Web Based Email Client Emails. Complete Backup of IMAP Account Messages from Online Email Services. Allows to Migrate Email Backup to Email Formats or Cloud Based Email Services. Email Backup Utility Facilitates 100% Safe & Secure Backup of Emails. Advance Filter Option to Sort and Create Backup of Emails. Simple GUI of Backup Wizard Provides Hassle Free Platform to Archive All Mails.

mailbox backup folder desktop migrate password mail server utility account import credentials limitation save clone software recommend outlook solution


Securely Hash Passwords with PHP

https://jonsuh.com/blog/securely-hash-passwords-with-php/

Saved by uncleflo on December 27th, 2017.

PHP 5.5+ now comes baked with a password_hash function to generate secure, one-way hashes along with a password_verify function to match a hash with the given password—If you’re a PHP developer, you should always be securely storing user passwords, no excuses. Developers have a huge responsibility when handling and storing user-sensitive information, such as a password. We should take extra precaution and the necessary steps to make sure the user’s data is safe and secure*. *Please keep in mind the following implementation is only part of the problem since it handles the data once the web server receives it; however, it does not address the other issue of securely sending the sensitive data over-the-air from the browser to the server, which is why a valid SSL certificate is necessary.

design development tutorial review journal handle store server security hash function password PHP precaution implement browser ssl php howto technical guide description understand


Password security in modern PHP

https://www.ibm.com/developerworks/library/wa-php-renewed_2/index.html

Saved by uncleflo on December 27th, 2017.

Discover how PHP 5.5 enables more-secure password handling. PHP, from the beginning, was a programming language made for building websites. That idea is in PHP's core far deeper than in any other programming language — perhaps one reason why PHP became and remains so popular for building web applications. But when PHP was first crafted in the mid-1990s, the term web application didn't even exist yet. Password protection, then, wasn't one of the features that the PHP creators devoted resources to. After all, you didn't need to worry about passwords when you used PHP just to put a site-visit counter or a date-modified stamp on your web page. But 20 years have passed, and now it's almost unthinkable to create a web application that doesn't involve password-protected user accounts. It's of the utmost importance that PHP programmers safeguard account passwords by using the latest and most secure methods. To that end, PHP 5.5 added a new password-hashing library created by Anthony Ferrara (@ircmaxell). The library makes several functions available that you can use to handle one-way password encryption with current best-practice methods. Other features anticipate future security needs so that as computers and hackers get more advanced, you can stay a step ahead of the bad guys. This article gives you an in-depth introduction to the library's functions and how to make the best use of them.

password security development php secure discover learn howto webpage modify feature resource language popular build encryption hash need best practice important complex difficulty sha md5 crypto salt generate algorithm software solution guide technical ibm library


The Sodium crypto library (libsodium)

https://download.libsodium.org/doc/

Saved by uncleflo on July 10th, 2017.

Sodium is a modern, easy-to-use software library for encryption, decryption, signatures, password hashing and more. It is a portable, cross-compilable, installable, packageable fork of NaCl, with a compatible API, and an extended API to improve usability even further. Its goal is to provide all of the core operations needed to build higher-level cryptographic tools. Sodium supports a variety of compilers and operating systems, including Windows (with MinGW or Visual Studio, x86 and x86_64), iOS and Android. The design choices emphasize security, and "magic constants" have clear rationales. And despite the emphasis on high security, primitives are faster across-the-board than most implementations of the NIST standards.

encryption decryption software sodium natrium modern easy hash password protection extend package system windows core operation usability php development administration security code library implement perl installation documentation instructions


oauth 1.2.3 - oauth consumer extension

https://pecl.php.net/package/oauth/1.2.3/windows

Saved by uncleflo on May 5th, 2017.

OAuth is an authorization protocol built on top of HTTP which allows applications to securely access data without having to store usernames and passwords.

oauth open authentication authorize php development administration server application code dll windows package consumer user standard password


Secure hash and salt for PHP passwords

http://stackoverflow.com/questions/401656/secure-hash-and-salt-for-php-passwords?rq=1

Saved by uncleflo on October 17th, 2016.

It is currently said that MD5 is partially unsafe. Taking this into consideration, I'd like to know which mechanism to use for password protection. This question, Is “double hashing” a password less secure than just hashing it once? suggests that hashing multiple times may be a good idea, whereas How to implement password protection for individual files? suggests using salt.I'm using PHP. I want a safe and fast password encryption system. Hashing a password a million times may be safer, but also slower. How to achieve a good balance between speed and safety? Also, I'd prefer the result to have a constant number of characters.

security password hash salt stackoverflow information developer development howto advice guide implementation mechanism idea protection website consider hashing entropy strength alternative snippet


Update: New 25 GPU Monster Devours Passwords In Seconds

https://securityledger.com/2012/12/new-25-gpu-monster-devours-passwords-in-seconds/

Saved by uncleflo on October 17th, 2016.

There needs to be some kind of Moore’s law analog to capture the tremendous advances in the speed of password cracking operations. Just within the last five years, there’s been an explosion in innovation in this ancient art, as researchers have realized that they can harness specialized silicon and cloud based computing pools to quickly and efficiently break passwords.

security bruteforce password crack description hash researcher speed research vlsi silicon chip hardware combination gpu administration


Password strength

https://en.wikipedia.org/wiki/Password_strength

Saved by uncleflo on October 17th, 2016.

Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. In its usual form, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to guess it correctly. The strength of a password is a function of length, complexity, and unpredictability.[1] Using strong passwords lowers overall risk of a security breach, but strong passwords do not replace the need for other effective security controls. The effectiveness of a password of a given strength is strongly determined by the design and implementation of the factors (knowledge, ownership, inherence). The first factor is the main focus in this article.

wikipedia password length strength security description guide howto explanation article guess risk online


Diceware passwords now need six random words to thwart hackers

http://arstechnica.com/information-technology/2014/03/diceware-passwords-now-need-six-random-words-to-thwart-hackers/

Saved by uncleflo on October 17th, 2016.

One of the best ways to create a random yet memorable password is to use "Diceware." This involves literally rolling dice and matching the resulting numbers to a list containing 7,776 English words, each identified by a five-digit number. Five Diceware words has long been thought to provide enough security for the average user.

dice password hacker word six generate result number security random article blog description administration online guide


The Diceware Passphrase Home Page

http://world.std.com/~reinhold/diceware.html

Saved by uncleflo on October 17th, 2016.

This page offers a better way to create a strong, yet easy to remember passphrase for use with encryption and security programs. Weak passwords and passphrases are one of the most common flaws in computer security. Take a few minutes and learn how to do it right. The information presented here can be used by anyone. No background in cryptography or mathematics is required. Just follow the simple steps below. If you'd like to know even more about passphrases, see the Frequently Asked Questions (FAQ), and please checkout the Diceware Security Blog, for commentary on the latest developments in computer security and shared secret authentication.

world security dice password create creativity random information unique strong encryption cryptography administration step step-by-step guidance


WebminWithoutARootAccount - Community Help Wiki

https://help.ubuntu.com/community/WebminWithoutARootAccount

Saved by uncleflo on February 8th, 2015.

Version 1.340 of webmin and possibly older are available directly as a .deb file via www.webmin.com and can be installed by double clicking the .deb package from Nautilus file manager. When installed, pointing a browser to https://localhost:10000 will load the webmin interface. You can now login as your normal username and password. Any user that can use Sudo permissions can log straigh in.

linux ubuntu administration debian username password permission interface manager online howto change root account question answer solution


Profiles - Where Firefox stores your bookmarks, passwords and other user data | How to | Firefox Help

https://support.mozilla.org/en-US/kb/profiles-where-firefox-stores-user-data?redirectlocale=en-US&redirectslug=Profiles

Saved by uncleflo on October 1st, 2014.

A Firefox profile stores all of your important data, such as your bookmarks, history, cookies, and passwords. This article explains how to copy the files to a new profile, lists important files in the profile and describes what information is stored in these files. If you are having a problem with Firefox then sometimes, rather than trying to find and fix the exact cause of the problem, it is easier just to make a new Firefox profile and copy your most important data over to it. The Reset Firefox feature will do this for you automatically.

sync standalone recover restore data session password bookmark firefox profile user cookie problem history file information administration solution guide migrate transfer


HowTos/Network/SecuringSSH - CentOS Wiki

http://wiki.centos.org/HowTos/Network/SecuringSSH#head-3579222198adaf43a3ecbdc438ebce74da40d8ec

Saved by uncleflo on September 12th, 2013.

OpenSSH (or Secure SHell) has become a de facto standard for remote access replacing the telnet protocol. SSH has made protocols such as telnet redundant due, in most part, to the fact that the connection is encrypted and passwords are no longer sent in plain text for all to see. However, a default installation of ssh isn't perfect, and when running an ssh server there are a few simple steps that can dramatically harden an installation.

open ssh sshd port security network howto wiki standard access protocol telnet redundant server password authentication public private key shell secure username root login centos


Fedora List - How do I make use of SSH_ASKPASS?

http://fedora.12.x6.nabble.com/How-do-I-make-use-of-SSH-ASKPASS-td2384794.html

Saved by uncleflo on August 31st, 2013.

I can't find out to make use of this. It is set to /usr/libexec/openssh/gnome-ssh-askpass, but I still get prompted for a password when I use ssh. I thought the prompt was only supposed to occur when I login to GNOME.

gnome ssh askpass linux password prompt terminal environment variable administration git version file manage


Linux Password & Shadow File Formats

http://www.tldp.org/LDP/lame/LAME/linux-admin-made-easy/shadow-file-formats.html

Saved by uncleflo on August 6th, 2013.

Traditional Unix systems keep user account information, including one-way encrypted passwords, in a text file called ``/etc/passwd''. As this file is used by many tools (such as ``ls'') to display file ownerships, etc. by matching user id #'s with the user's names, the file needs to be world-readable. Consequentally, this can be somewhat of a security risk.

risk guide system shadow description format security linux user unix password administration


PAM Authentication Backend

https://www.dokuwiki.org/auth:pam

Saved by uncleflo on May 5th, 2013.

I wanted to authenticate users without have a separate set of passwords. I found this authentication backend, but it doesn't work with the latest version of DokuWiki. I therefore set about writing my own authentication backend, which I will post here. I haven't tested it extensively, but it seems to work for me.

information development authentication php ubuntu wiki solution password pam


PHP HTTP Authentication | Papermashup.com

http://papermashup.com/php-http-authentication/

Saved by uncleflo on March 27th, 2013.

Occasionally you may wish to make certain pages of your site only viewable to a select few. you can do this by using PHPs built in HTTP Authentication. The code needs to go right at the top of your php page so don’t get ‘Headers Already Sent’ errors. You can see that we’ve specified the username and password in the variables at the top of the script you can change these to reflect your own username and password.

http php authentication solution guide description howto user password server header


No further bookmarks found.