DEV Community

# passwords

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Securing and Storing Passwords

Securing and Storing Passwords

54
Comments 2
3 min read
(Very) Basic Intro to Hash Functions (SHA-256, MD-5, etc)

(Very) Basic Intro to Hash Functions (SHA-256, MD-5, etc)

51
Comments 2
5 min read
Password max length limits are dumb (but we need them)

Password max length limits are dumb (but we need them)

45
Comments 13
3 min read
Linux: GPG-keys, Pass – passwords manager, and passwords import from a KeePass database

Linux: GPG-keys, Pass – passwords manager, and passwords import from a KeePass database

44
Comments 9
10 min read
Passwords

Passwords

42
Comments 9
8 min read
Hashing Passwords – Python Cryptography Examples

Hashing Passwords – Python Cryptography Examples

38
Comments 1
3 min read
SSH: RSA keys, and ssh-agent for SSH keys and their passwords management

SSH: RSA keys, and ssh-agent for SSH keys and their passwords management

34
Comments
10 min read
Fast Passwordless Auth in Flutter: Add a One-line Sign Up and Login with Device using Cotter

Fast Passwordless Auth in Flutter: Add a One-line Sign Up and Login with Device using Cotter

32
Comments 1
5 min read
Apie CityBee ir slaptažodžių saugumą

Apie CityBee ir slaptažodžių saugumą

22
Comments 11
11 min read
Creating A Show-or-Hide-Password Feature For Angular Forms

Creating A Show-or-Hide-Password Feature For Angular Forms

20
Comments 5
4 min read
(Very) Basic intro to AES-256 Cipher

(Very) Basic intro to AES-256 Cipher

20
Comments
5 min read
Shamir's Secret Sharing Scheme in JavaScript

Shamir's Secret Sharing Scheme in JavaScript

19
Comments 3
2 min read
Ridiculously Simple Ways To Improve and Protect Your Passwords

Ridiculously Simple Ways To Improve and Protect Your Passwords

19
Comments
3 min read
Stop Storing Passwords. You Don't Need Them.

Stop Storing Passwords. You Don't Need Them.

17
Comments
6 min read
Cryptography Trends And News Going Into 2020

Cryptography Trends And News Going Into 2020

14
Comments
2 min read
HMAC and MAC Explained Simply – Building Secure Auth With JWTs

HMAC and MAC Explained Simply – Building Secure Auth With JWTs

13
Comments
1 min read
What would it take to increase the password max length limit?

What would it take to increase the password max length limit?

12
Comments 9
4 min read
(Very) Basic Shamir’s Secret Sharing

(Very) Basic Shamir’s Secret Sharing

11
Comments
3 min read
Switching to KeePass and Syncthing for password management

Switching to KeePass and Syncthing for password management

11
Comments 2
3 min read
(Very) Basic Intro To Elliptic Curve Cryptography

(Very) Basic Intro To Elliptic Curve Cryptography

11
Comments
7 min read
How to spot poor implementations of 2FA

How to spot poor implementations of 2FA

10
Comments
2 min read
Zero-Knowlege Authentication with JavaScript

Zero-Knowlege Authentication with JavaScript

10
Comments
3 min read
Once upon a time, PASSWORDS 🔑🤯☠️

Once upon a time, PASSWORDS 🔑🤯☠️

9
Comments 1
4 min read
BCrypt == Ruby 'magic'??

BCrypt == Ruby 'magic'??

8
Comments
6 min read
Passwords are not secure! The solution for developers

Passwords are not secure! The solution for developers

8
Comments 3
3 min read
correct horse battery staple

correct horse battery staple

8
Comments 1
2 min read
PasswĂśrter mit eYAML-GPG in Hiera speichern

PasswĂśrter mit eYAML-GPG in Hiera speichern

7
Comments
6 min read
Qvault’s Offline Mode in Electron

Qvault’s Offline Mode in Electron

7
Comments
2 min read
How To Stop Account Hijacking

How To Stop Account Hijacking

7
Comments
3 min read
Misconfigurations in Google Firebase lead to over 19.8 million leaked secrets

Misconfigurations in Google Firebase lead to over 19.8 million leaked secrets

7
Comments
4 min read
Using EYAML-GPG to store secrets in Hiera

Using EYAML-GPG to store secrets in Hiera

6
Comments
6 min read
(Very) Basic Intro to Key Derivation Functions (Argon2, Scrypt, etc)

(Very) Basic Intro to Key Derivation Functions (Argon2, Scrypt, etc)

6
Comments 2
3 min read
You can’t function in 2019 without a password manager

You can’t function in 2019 without a password manager

6
Comments
3 min read
Passay - The password generation and validation library

Passay - The password generation and validation library

6
Comments
4 min read
The Math of Password Hashing Algorithms and Entropy

The Math of Password Hashing Algorithms and Entropy

6
Comments
9 min read
Bitwarden: shared MFA TOTP codes for Gmail accounts

Bitwarden: shared MFA TOTP codes for Gmail accounts

6
Comments 1
3 min read
Should you store the passwords in the database?

Should you store the passwords in the database?

6
Comments
1 min read
Bitwarden: an organization’s password manager self-hosted version installation on an AWS EC2

Bitwarden: an organization’s password manager self-hosted version installation on an AWS EC2

6
Comments
18 min read
Bitcoin Doesn’t Care About Your Identity, Only Your Knowledge

Bitcoin Doesn’t Care About Your Identity, Only Your Knowledge

5
Comments 1
2 min read
Calling the brute(force) squad

Calling the brute(force) squad

5
Comments
6 min read
Password-Synchronization with Syncthing

Password-Synchronization with Syncthing

4
Comments
4 min read
My password policy

My password policy

4
Comments
2 min read
How do you keep track of your passwords?

How do you keep track of your passwords?

4
Comments 2
3 min read
Many passwords | Hacktoberfest

Many passwords | Hacktoberfest

3
Comments
1 min read
Sharing secrets with the 1Password CLI

Sharing secrets with the 1Password CLI

3
Comments
3 min read
Intro to Qvault

Intro to Qvault

3
Comments
3 min read
Maybe Passwords are the Future

Maybe Passwords are the Future

3
Comments 2
6 min read
Creating and Remembering a Strong Passphrase

Creating and Remembering a Strong Passphrase

3
Comments 1
3 min read
Passkb: how to reliably and securely bypass password paste blocking

Passkb: how to reliably and securely bypass password paste blocking

2
Comments 2
6 min read
How To Add Passkeys To Amazon Cognito

How To Add Passkeys To Amazon Cognito

2
Comments
9 min read
Hashcat vs John the Ripper: A comparative benchmarking of password cracking tools 🚀

Hashcat vs John the Ripper: A comparative benchmarking of password cracking tools 🚀

2
Comments 1
9 min read
COMO CRIAR UMA SENHA SEGURA

COMO CRIAR UMA SENHA SEGURA

2
Comments
3 min read
ELI5: How does a TPM work?

ELI5: How does a TPM work?

1
Comments
4 min read
Trying secrets (Python) to Generate Password

Trying secrets (Python) to Generate Password

1
Comments
2 min read
How to enable breached password detection with FusionAuth

How to enable breached password detection with FusionAuth

1
Comments
7 min read
I'm a little iffy on Passkeys

I'm a little iffy on Passkeys

1
Comments
6 min read
9 Most Common Types of Password Attacks and How to Stop Them

9 Most Common Types of Password Attacks and How to Stop Them

Comments
2 min read
PrivacyProtect: Securely Share Passwords and Store Sensitive Files in Convenient Locations

PrivacyProtect: Securely Share Passwords and Store Sensitive Files in Convenient Locations

Comments
6 min read
Passwords, passwords, passwords!!

Passwords, passwords, passwords!!

Comments
5 min read
Privacy and Security Series, Part III: Going Farther with MFA and Audits

Privacy and Security Series, Part III: Going Farther with MFA and Audits

Comments
3 min read
loading...