Tags: passwords


browser security
These simple steps can go a long way toward improving your online security.

5 Easy Tips for Linux Web Browser Security

If you use your Linux desktop and never open a web browser, you are a special kind of user. For most of us, however, a web browser has become one of the most-used digital tools on the planet. We work, we play, we get news, we interact, we bank… the number of things we do via a web browser far...
Read 0 Comments


It would be very damaging for any developer to have their PGP keys stolen; learn how to keep yours secure.

Protecting Code Integrity with PGP — Part 4: Moving Your Master Key to Offline Storage

In this tutorial series, we're providing practical guidelines for using PGP. You can catch up on previous articles here: Part 1: Basic Concepts and Tools Part 2: Generating Your Master Key Part 3: Generating PGP Subkeys Here in part 4, we continue the series with a look at how and why to move your...
Read 0 Comments

Shell Scripting and Security

Basic ways you can use shell scripts to monitor password strength and secret accounts. Whether you have Linux running on your laptop or ancient PC file server or whether you're managing a data center, your system is also vulnerable to malicious users. I can't offer any sort of robust solution in...
Read 0 Comments

TNS Guide: How to Manage Passwords and Keep Your Online Accounts Secure

Massive data breaches over the past several years have shown that you can’t trust online service providers to keep your account information secure. So, if you haven’t done this until now, it’s time to carefully consider what and how you share with such companies, starting with your password. First...
Read 0 Comments

IoT Cybersecurity: What's Plan B?

In August, four US Senators introduced a bill designed to improve Internet of Things (IoT) security. The IoT Cybersecurity Improvement Act of 2017 is a modest piece of legislation. It doesn't regulate the IoT market. It doesn't single out any industries for particular attention, or force any...
Read 1 Comments

Changes in Password Best Practices

NIST recently published its four-volume SP800-63-3 Digital Identity Guidelines. Among other things, it makes three important suggestions when it comes to passwords: Stop it with the annoying password complexity rules. They make passwords harder to remember. They increase errors because artificially...
Read 0 Comments

Crypto Anchors: Exfiltration Resistant Infrastructure

Lately, I've been thinking a lot about a concept that Nathan McCauley and I came up with a few years ago: crypto-anchoring—and how much impact this kind of architectural decision could have in the breaches that we've been experiencing lately. It turns out that the vast majority of data breaches...
Read 0 Comments

Dealing with NIST's About-Face on Password Complexity

In the last few years, we've been seeing some significant changes in the suggestions that security experts are making for password security. While previous guidance increasingly pushed complexity in terms of password length, the mix of characters used, controls over password reuse, and forced...
Read 0 Comments


two-factor authentication
Strong, unique, randomly generated passwords are a critical requirement for every user. Here, we cover some best practices involving 2-factor authentication and password creation and use.

Best Practices for 2-Factor Authentication and Password Creation on Linux

As we mentioned in the previous article, web browsers present the largest and the most exposed attack surface on your Linux workstation. We’ve already discussed some best practices that Linux sysadmins can follow to reduce the impact of a compromised browser, such as upgrading to Wayland, using a...
Read 0 Comments

Security Debt is an Engineer’s Problem

Just like organizations can build up technical debt, so too can they also build up something called “security debt,” if they don’t plan accordingly, attendees learned at the WomenWhoCode Connect event at Twitter headquarters in San Francisco last month. Security has got to be integral to every step...
Read 0 Comments


Click Here!