
Registered since September 28th, 2017
Has a total of 4246 bookmarks.
Showing top Tags within 19 bookmarks
howto information development guide reference administration design website software solution service product online business uk tool company linux code server system application web list video marine create data experience description tutorial explanation technology build blog article learn world project boat download windows security lookup free performance javascript technical network control beautiful support london tools course file research purchase library programming image youtube example php construction html opensource quality install community computer profile feature power browser music platform mobile work user process database share manage hardware professional buy industry internet dance advice installation developer 3d camera search access customer travel material test standard review documentation css money engineering engine develop webdesign device photography digital api speed source management program phone discussion question event client story simple water marketing app content yacht setup package fast idea interface account communication cheap compare script study market live easy google resource operation startup monitor training
Tag selected: password.
Looking up password tag. Showing 19 results. Clear
Saved by uncleflo on August 1st, 2019.
This article will get you up and running with a Raspberry Pi, connected to your wifi network and accessible over ssh, without ever needing to connect anything to it, besides power. After flashing the image to the SD card, the drive has been ejected. Disconnect and connect the SD card so it gets detected by macOS again. A boot drive should appear. Open a terminal window and cd to the boot drive using the following command:
raspberry pi boot sd ethernet connect ping password pixel verify click enable file setup keyboard extract desktop maybe card image chip update command power wifi connection howto ssh flash arm automatic drive detect network blog developer administration
Saved by uncleflo on May 4th, 2019.
This topic describes how to create the most common types of database users. There are eleven type of users. The complete list is provided in the topic CREATE USER (Transact-SQL). All varieties of SQL Server support database users, but not necessarily all types of users. You can create a database user by using SQL Server Management Studio or by using Transact-SQL.
authenticate database password user schema folder authentication server select query containment specify feedback certificate connect execute confirm windows transaction manage studio microsoft sqlserver type description variety support topic access privilege
Saved by uncleflo on April 28th, 2019.
Best Email Backup Tool to Archive Emails of 85+ Email Applications. Take Backup of Webmail, Cloud Mail, cPanel & Web Based Email Client Emails. Complete Backup of IMAP Account Messages from Online Email Services. Allows to Migrate Email Backup to Email Formats or Cloud Based Email Services. Email Backup Utility Facilitates 100% Safe & Secure Backup of Emails. Advance Filter Option to Sort and Create Backup of Emails. Simple GUI of Backup Wizard Provides Hassle Free Platform to Archive All Mails.
mailbox backup folder desktop migrate password mail server utility account import credentials limitation save clone software recommend outlook solution
Saved by uncleflo on December 27th, 2017.
PHP 5.5+ now comes baked with a password_hash function to generate secure, one-way hashes along with a password_verify function to match a hash with the given password—If you’re a PHP developer, you should always be securely storing user passwords, no excuses. Developers have a huge responsibility when handling and storing user-sensitive information, such as a password. We should take extra precaution and the necessary steps to make sure the user’s data is safe and secure*. *Please keep in mind the following implementation is only part of the problem since it handles the data once the web server receives it; however, it does not address the other issue of securely sending the sensitive data over-the-air from the browser to the server, which is why a valid SSL certificate is necessary.
design development tutorial review journal handle store server security hash function password PHP precaution implement browser ssl php howto technical guide description understand
Saved by uncleflo on December 27th, 2017.
Discover how PHP 5.5 enables more-secure password handling. PHP, from the beginning, was a programming language made for building websites. That idea is in PHP's core far deeper than in any other programming language — perhaps one reason why PHP became and remains so popular for building web applications. But when PHP was first crafted in the mid-1990s, the term web application didn't even exist yet. Password protection, then, wasn't one of the features that the PHP creators devoted resources to. After all, you didn't need to worry about passwords when you used PHP just to put a site-visit counter or a date-modified stamp on your web page. But 20 years have passed, and now it's almost unthinkable to create a web application that doesn't involve password-protected user accounts. It's of the utmost importance that PHP programmers safeguard account passwords by using the latest and most secure methods. To that end, PHP 5.5 added a new password-hashing library created by Anthony Ferrara (@ircmaxell). The library makes several functions available that you can use to handle one-way password encryption with current best-practice methods. Other features anticipate future security needs so that as computers and hackers get more advanced, you can stay a step ahead of the bad guys. This article gives you an in-depth introduction to the library's functions and how to make the best use of them.
password security development php secure discover learn howto webpage modify feature resource language popular build encryption hash need best practice important complex difficulty sha md5 crypto salt generate algorithm software solution guide technical ibm library
Saved by uncleflo on July 10th, 2017.
Sodium is a modern, easy-to-use software library for encryption, decryption, signatures, password hashing and more. It is a portable, cross-compilable, installable, packageable fork of NaCl, with a compatible API, and an extended API to improve usability even further. Its goal is to provide all of the core operations needed to build higher-level cryptographic tools. Sodium supports a variety of compilers and operating systems, including Windows (with MinGW or Visual Studio, x86 and x86_64), iOS and Android. The design choices emphasize security, and "magic constants" have clear rationales. And despite the emphasis on high security, primitives are faster across-the-board than most implementations of the NIST standards.
encryption decryption software sodium natrium modern easy hash password protection extend package system windows core operation usability php development administration security code library implement perl installation documentation instructions
Saved by uncleflo on May 5th, 2017.
OAuth is an authorization protocol built on top of HTTP which allows applications to securely access data without having to store usernames and passwords.
oauth open authentication authorize php development administration server application code dll windows package consumer user standard password
Saved by uncleflo on October 17th, 2016.
It is currently said that MD5 is partially unsafe. Taking this into consideration, I'd like to know which mechanism to use for password protection. This question, Is “double hashing” a password less secure than just hashing it once? suggests that hashing multiple times may be a good idea, whereas How to implement password protection for individual files? suggests using salt.I'm using PHP. I want a safe and fast password encryption system. Hashing a password a million times may be safer, but also slower. How to achieve a good balance between speed and safety? Also, I'd prefer the result to have a constant number of characters.
security password hash salt stackoverflow information developer development howto advice guide implementation mechanism idea protection website consider hashing entropy strength alternative snippet
Saved by uncleflo on October 17th, 2016.
There needs to be some kind of Moore’s law analog to capture the tremendous advances in the speed of password cracking operations. Just within the last five years, there’s been an explosion in innovation in this ancient art, as researchers have realized that they can harness specialized silicon and cloud based computing pools to quickly and efficiently break passwords.
security bruteforce password crack description hash researcher speed research vlsi silicon chip hardware combination gpu administration
Saved by uncleflo on October 17th, 2016.
Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. In its usual form, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to guess it correctly. The strength of a password is a function of length, complexity, and unpredictability.[1] Using strong passwords lowers overall risk of a security breach, but strong passwords do not replace the need for other effective security controls. The effectiveness of a password of a given strength is strongly determined by the design and implementation of the factors (knowledge, ownership, inherence). The first factor is the main focus in this article.
wikipedia password length strength security description guide howto explanation article guess risk online
Saved by uncleflo on October 17th, 2016.
One of the best ways to create a random yet memorable password is to use "Diceware." This involves literally rolling dice and matching the resulting numbers to a list containing 7,776 English words, each identified by a five-digit number. Five Diceware words has long been thought to provide enough security for the average user.
dice password hacker word six generate result number security random article blog description administration online guide
Saved by uncleflo on October 17th, 2016.
This page offers a better way to create a strong, yet easy to remember passphrase for use with encryption and security programs. Weak passwords and passphrases are one of the most common flaws in computer security. Take a few minutes and learn how to do it right. The information presented here can be used by anyone. No background in cryptography or mathematics is required. Just follow the simple steps below. If you'd like to know even more about passphrases, see the Frequently Asked Questions (FAQ), and please checkout the Diceware Security Blog, for commentary on the latest developments in computer security and shared secret authentication.
world security dice password create creativity random information unique strong encryption cryptography administration step step-by-step guidance
Saved by uncleflo on February 8th, 2015.
Version 1.340 of webmin and possibly older are available directly as a .deb file via www.webmin.com and can be installed by double clicking the .deb package from Nautilus file manager. When installed, pointing a browser to https://localhost:10000 will load the webmin interface. You can now login as your normal username and password. Any user that can use Sudo permissions can log straigh in.
linux ubuntu administration debian username password permission interface manager online howto change root account question answer solution
Saved by uncleflo on October 1st, 2014.
A Firefox profile stores all of your important data, such as your bookmarks, history, cookies, and passwords. This article explains how to copy the files to a new profile, lists important files in the profile and describes what information is stored in these files. If you are having a problem with Firefox then sometimes, rather than trying to find and fix the exact cause of the problem, it is easier just to make a new Firefox profile and copy your most important data over to it. The Reset Firefox feature will do this for you automatically.
sync standalone recover restore data session password bookmark firefox profile user cookie problem history file information administration solution guide migrate transfer
Saved by uncleflo on September 12th, 2013.
OpenSSH (or Secure SHell) has become a de facto standard for remote access replacing the telnet protocol. SSH has made protocols such as telnet redundant due, in most part, to the fact that the connection is encrypted and passwords are no longer sent in plain text for all to see. However, a default installation of ssh isn't perfect, and when running an ssh server there are a few simple steps that can dramatically harden an installation.
open ssh sshd port security network howto wiki standard access protocol telnet redundant server password authentication public private key shell secure username root login centos
Saved by uncleflo on August 31st, 2013.
I can't find out to make use of this. It is set to /usr/libexec/openssh/gnome-ssh-askpass, but I still get prompted for a password when I use ssh. I thought the prompt was only supposed to occur when I login to GNOME.
gnome ssh askpass linux password prompt terminal environment variable administration git version file manage
Saved by uncleflo on August 6th, 2013.
Traditional Unix systems keep user account information, including one-way encrypted passwords, in a text file called ``/etc/passwd''. As this file is used by many tools (such as ``ls'') to display file ownerships, etc. by matching user id #'s with the user's names, the file needs to be world-readable. Consequentally, this can be somewhat of a security risk.
risk guide system shadow description format security linux user unix password administration
Saved by uncleflo on May 5th, 2013.
I wanted to authenticate users without have a separate set of passwords. I found this authentication backend, but it doesn't work with the latest version of DokuWiki. I therefore set about writing my own authentication backend, which I will post here. I haven't tested it extensively, but it seems to work for me.
information development authentication php ubuntu wiki solution password pam
Saved by uncleflo on March 27th, 2013.
Occasionally you may wish to make certain pages of your site only viewable to a select few. you can do this by using PHPs built in HTTP Authentication. The code needs to go right at the top of your php page so don’t get ‘Headers Already Sent’ errors. You can see that we’ve specified the username and password in the variables at the top of the script you can change these to reflect your own username and password.
http php authentication solution guide description howto user password server header
No further bookmarks found.