Umesh Panditumeshpandit.hashnode.dev·Dec 1, 2024How Microsoft Copilot Protects You From Online Threats and Cyber RisksI care a lot about security online. I think most people do too. The internet has phishing emails and sneaky malware, so Microsoft has its Copilot to help you stay safe online. It is like having some cybersecurity expert accompanying you as you make ...Discussmicrosoft copilot
Suvam Mohapatraneverstop-password-blog.hashnode.dev·Dec 1, 2024How Are Passwords Stored in Databases? (And Why It Matters)Have you ever wondered what happens to your password after creating an account? If it’s stored in plain text, that’s a recipe for disaster. In the event of a data breach, your password will be exposed instantly. This blog explores how passwords are s...Discusspasswordstorage
Yashblog.yassh.in·Nov 26, 2024Database-less Password Resets using JWTI was given a task to setup Authentication for our application and I had a few unsaid restrictions, it was not sensible to modify the database schema if not absolutely necessary because it is a complex database with many connected tables which are co...Discuss·1 like·54 readsJWT
Douglas Sabwa Indumwablog.douglas.africa·Nov 23, 2024Argon2: The Gold Standard for Password HashingIn an era where data breaches and cyberattacks are increasingly common, the importance of securing user passwords cannot be overstated. Password hashing is a critical component of this security, ensuring that even if an attacker gains access to store...Discuss·52 readsSecurityArgon2id
Karlygash Yakiyayevakarlygash-yakiyayeva.dev·Nov 23, 2024Understanding /etc/passwd/ and /etc/shadow/ files in LinuxThe /etc/passwd and /etc/shadow files are the backbone of Linux user management. Together, they store user account information and handle authentication securely. This article provides a hands-on guide to understanding these files, their structure, a...Discuss·30 readsLinuxLinux
Ashish mauryablog.theashishmaurya.me·Nov 23, 2024Bcrypt: The Unsung Hero of Password SecurityIn the digital age, where data breaches are as common as coffee spills, one cryptographic algorithm stands out for its robustness in securing our passwords: bcrypt. Let's dive into the world of bcrypt hashing, uncovering its mechanics, the role of sa...Discussbackend
user1272047programmingetc.hashnode.dev·Nov 18, 2024Export your saved passwords from Chrome/ChromiumTo export your saved passwords from Google Chrome as of November 2024, follow these steps: Open Chrome: Launch the Google Chrome browser on your computer. Access Password Manager: Click on the three vertical dots (⋮) in the top-right corner of t...Discusschromium
Chetan Mohanrao Mohoddevops-concepts-by-chetan.hashnode.dev·Nov 13, 2024Storing Passwords in Jenkins—Here’s How I Keep Them Safe and Sound!First, create a Personal Access Token. How do you create a PAT? Follow These Steps: Log in to DockerHub: https://hub.docker.com/ Go to Account settings: Click on Generate New Token: Add the following details: Once you click on Generate,...Discuss·45 readsJenkins credentials
Hacker22saimonch16-blog.hashnode.dev·Oct 29, 2024Dictionary Generator V1.0Generador de Diccionarios de Contraseñas Personalizadas Hoy les comparto una herramienta que he creado y publicado en GitHub: un Generador de Diccionarios de Contraseñas. Este script en Python permite crear diccionarios personalizados utilizando info...Discusshacking
J3bitokjebitok.hashnode.dev·Oct 28, 2024Cryptography: John the Ripper: The Basics (TryHackMe)In this article, I will write a write-up for John the Ripper: The Basics that the Basic Terms, Setting Up John on Your System, Cracking Basic Hashes, Cracking Windows Authentication Hashes, Cracking /etc/shadow Hashes, Single Crack Mode, Custom Rules...Discussrainbow-table