© 2023 Hashnode
#passwords
If you’re looking up a Wi-Fi network password, you’ll have to use a command prompt Open the command prompt. Then, type the following command: netsh wlan show profile This command will list every Wi-F…
As a developer, managing environment variables and secret credentials can be a daunting task. Hardcoded secrets, env files, and copy-pasted credentials can easily become a security nightmare. That's w…
Authentication 🗝️ is an integral part of building products (at least for the products that require it, not all products require authentication you know 😏). Software engineering over the years has gr…
In this article, we are gonna talk about how to securely manage passwords in Java applications, and for this, we'll be using the Java KeyStore API. I will not be diving into details about Key stores b…
Have I Been Pwned? Or rather, have you? It's a good question, and if you're curious about whether any of your email addresses or passwords were included in a data breach, you can easily find out at Ha…
With a compromised password, it’s not just your account or information that remains vulnerable. Hackers typically steal passwords as the first leg of a larger attack; and build up to exploit your comp…
It is the early 90s and I am sitting at my terminal dialer Telix. My dad and I used it to dial over a modem into BBS systems such as Canada Remote Systems which ran PC Board BBS software. A BBS was a public computer with lots of phone lines…
The root password is an essential aspect of any Linux system. It provides administrative privileges to the user, allowing them to modify system files, install software, and perform other critical oper…
When I first learned about haveibeenpwned a couple of years ago, it put into perspective how bad my security practices were. At that time, I committed all the primary sins: Reusing passwords Using t…
Before considering the term “Two-factor Authentication”, there is a need to understand the importance of digital security in the present world. With our world evolving into a world of technology where almost all human activities are done on…