Skip to main content

Home/ Information Security/ Group items tagged password

Rss Feed Group items tagged

Kiran Kuppa

Want to Block Common Passwords? Sorry, That is Patented | Xato - Passwords & Security - 0 views

  •  
    What amazes me though is how many patents I encounter that have been granted for some of the most obvious, well-known and ordinary techniques we use in the authentication process. In fact, every imaginable aspect of password selection, authentication, storage, and recovery seems to be covered by one or more patents.As the title says, the process of checking for common or weak passwords is patented. In fact, it is covered by quite a few patents: 1.System for controlling access to a secure system by verifying acceptability 2.Specifying a set of forbidden passwords 3.Preventing trivial character combinations 4.Password strength checking method and apparatus… 5.Method and system for proactive password validation 6.Method, system, and storage medium for determining trivial keyboard sequences of proposed passwords 7.Apparatus and method for indicating password quality and variety
Rich Hintz

Download PDF Password Remover 3.0 Free Trial - The PDF Password Remover can be used to ... - 0 views

  • PDF Password Remover
  •  
    decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing (changing), printing, selecting text and graphics (and copying them into the Clipboard), or adding/changing annotations and form fields. Decryption is being done instantly. Decrypted file can be opened in any PDF viewer (e.g. Adobe Acrobat Reader) without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat (including 7.x, which features 128-bit encryption) are supported.
Kiran Kuppa

Google looks to kill the password using tiny cryptographic card | Ars Technica - 0 views

  •  
    "Google engineers are experimenting with new ways to replace user passwords, including a tiny YubiKey cryptographic card that would automatically log people into Gmail, according to a report published Friday. In the future, engineers at the search giant hope to find even easier ways for people to log in not just to Google properties, but to sites across the Web. They envision a single smartphone or smartcard device that would act like a house or car key, allowing people access to all the services they consume online. They see people authenticating with a single device and then using it everywhere."
Zaid Mark

Protect Your Windows 8 PC with a Picture Password - 0 views

  •  
    Windows 8 enables you to protect your account with a picture password. The magnetism of a picture password is obvious. Moreover, it may well prove to be a faster means of logging in. Follow this video tutorial to enable picture password.
David Szpunar

Ophcrack - Windows password auditing tool - 0 views

  •  
    "Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms."
Devid Thomas

Learn how Eliot from Mr.robot hacked into to his therapist's new boyfriend's email and ... - 0 views

  •  
    SOURCE: Information Security Newspaper http://www.securitynewspaper.com/2015/12/08/learn-eliot-mr-robot-hacked-therapists-new-boyfriends-email-bank-accounts/ TAGS: Bank Account Passwords, Mr.robot text-align: ...
  •  
    SOURCE: Information Security Newspaper http://www.securitynewspaper.com/2015/12/08/learn-eliot-mr-robot-hacked-therapists-new-boyfriends-email-bank-accounts/ TAGS: Bank Account Passwords, Mr.robot text-align: ...
wolf hesse

default password list - 0 views

  • Default Password List
Seçkin Anıl Ünlü

Protects your application's access data and passwords. Biometrically. - KeyTrac - 1 views

  •  
    Sonunda birileri urun haline donusturmus :)
quantiq

Database security: Top 10 database vulnerabilities list - Security Bytes - 0 views

  •  
    Database administrators are all too familiar with the issues outlined in Application Security Inc.'s new Top 10 database vulnerabilities list. From the use of default passwords to patching issues, database management systems have been known to be plagued with issues making them vulnerable to attack.
wolf hesse

Extreme Security -- Do It Securely or Not at all !: Use default password, get hijacked - 0 views

  •  
    Countermeasures against DNSChanger:
1 - 20 of 21 Next ›
Showing 20 items per page