Skip to main content

Home/ Collective Intelligence theory research/ Group items tagged password

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

Tools To Password Protect Folder In Linux - LinuxAndUbuntu - 0 views

  •  
    "Most of the time, having a password protected user is all you need to keep your files private and protected from prying eyes. There are those few times when you need to allow access to your account to another person, sometimes there are folders or files you would like to keep away from being accessed. Now we can password protect folder with several handy tools. In the Windows world, these tools are quite easily available for Windows but today we will look at a few options available for the Linux user."
  •  
    "Most of the time, having a password protected user is all you need to keep your files private and protected from prying eyes. There are those few times when you need to allow access to your account to another person, sometimes there are folders or files you would like to keep away from being accessed. Now we can password protect folder with several handy tools. In the Windows world, these tools are quite easily available for Windows but today we will look at a few options available for the Linux user."
Gonzalo San Gil, PhD.

Yes, 123456 is the most common password, but here's why that's misleading | Ars Technica - 0 views

  •  
    "The number of people using woefully crackable passwords has decreased dramatically"
  •  
    "The number of people using woefully crackable passwords has decreased dramatically"
Gonzalo San Gil, PhD.

5 signs your Web application has been hacked | ITworld - 0 views

  •  
    "hacked FREE Become An Insider Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CSO, Computerworld, InfoWorld, IT World and Network World Learn more. Other Insider Recommendations Java 101 primer: Composition and inheritance 6 simple tricks for protecting your passwords Free course: "JavaScript: The Good Parts" Free Course: The Dark Side of Technology Careers Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all"
  •  
    "hacked FREE Become An Insider Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CSO, Computerworld, InfoWorld, IT World and Network World Learn more. Other Insider Recommendations Java 101 primer: Composition and inheritance 6 simple tricks for protecting your passwords Free course: "JavaScript: The Good Parts" Free Course: The Dark Side of Technology Careers Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all"
Gonzalo San Gil, PhD.

IT resume makeover: Don't try to please everyone | CIO [# ! Note] - 0 views

  •  
    " Become An Insider Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more. Latest Insider tabtops 2 InfoWorld Invasion of the tabtops: The new hybrid tablets reviewed Top 25 Windows 10 Free Tools CIO Your step-by-step guide to repairing Windows 10 ted talk CSO 10 security Ted Talks you can't miss Hashtag chalk marks Computerworld A look inside the Microsoft Local Administrator Password... See all Insider Writing a resume means knowing your audience. If you try to please everyone, you'll only wind up with an unfocused and disjointed document filled with unconnected work experience and accomplishments."
Gonzalo San Gil, PhD.

7 Tools to Encrypt/Decrypt and Password Protect Files in Linux - 0 views

  •  
    "Encryption is the process of encoding files in such a way that only those who are authorized can access it. Mankind is using encryption from ages even when computers were not in existence. During war they would pass some kind of message that only their tribe or those who are concerned were able to understand."
  •  
    "Encryption is the process of encoding files in such a way that only those who are authorized can access it. Mankind is using encryption from ages even when computers were not in existence. During war they would pass some kind of message that only their tribe or those who are concerned were able to understand."
Gonzalo San Gil, PhD.

Cómo cambiar la contraseña de root de nuestro sistema Gnu/Linux - 0 views

  •  
    "El hecho de la filtración de la imagen hackeada de Linux Mint hizo que empezase a recordar que opciones y comandos hay en Gnu/Linux para mejorar la seguridad del sistema operativo."
1 - 6 of 6
Showing 20 items per page