|
You are here |
risley.net | ||
| | | | |
blog.thenewoil.org
|
|
| | | | | Password managers are thankfully becoming a mainstream topic. In addition to seeing commercials for certain ones from time to time, it's ... | |
| | | | |
juliaferraioli.com
|
|
| | | | | 2-Factor Authentication (2FA) or Multi-Factor Authentication (MFA) are ways of securing accounts above and beyond normal password protection. Typically, we think of 2FA as something you know (your password) and something you have (a device). The idea is that if you compromise one, you still cant get access to the protected resource. A room protected by a keypad and ID card reader is a great example of 2FA. You might be able to guess the code, but youd also need a valid ID card to get access to the locked... | |
| | | | |
vimist.github.io
|
|
| | | | | [AI summary] The author discusses the development of a custom password manager using layered architecture and shell scripting, emphasizing extendability and integration with Bash scripts for managing sensitive information. | |
| | | | |
royvanrijn.com
|
|
| | | Today I've been looking into rainbow tables. These are tables used to do a reverse lookup for a hash function. For example MD5, or Windows LAN Manager. Usual... | ||