KeePass Passwort-Speicher Einführung
Eine der häufigsten Fragen bzw. Tipps, die ich meinen Bekannten gebe, ist: Benutzt sichere Passwörter! Am besten noch verschiedene für alle Services, also Dienste/Homepages/E-Mail/etc. im Internet und...
View ArticlePassword Generator Options for KeePass
This is a short post in which I show the options I am using when generating random passwords with the Password Generator that ships with the password safe KeePass. The character set should be as big as...
View ArticlePassword Strength/Entropy: Characters vs. Words
This is a mathematical post which is related to the xkcd 936 comic about password strength. The central question is: What is better for passwords? A password containing a few random characters or a...
View ArticleSichere Passwörter erzeugen & merken
Wie dem auch sei: Wir kommen nicht um die Benutzung von Passwörtern herum und es ist nach wie vor wichtig, sichere (= komplexe) Passwörter zu verwenden. Dabei ist es vor allem schwierig, einen...
View ArticlePassphrase Generation Tools
If you want to create random passphrases based on certain wordlists, a tool that generates these passphrases should be used rather than generating them yourself. Here comes an introduction to four...
View ArticlePassword Policies – Appropriate Security Techniques
How are passwords stolen? What are common password flaws? What are the security techniques to enhance the security of passwords respectively the security of the login-services? What authentication...
View ArticleFortiGate 2-Factor Authentication via SMS
Two-factor authentication is quite common these days. That’s good. Many service providers offer a second authentication before entering their systems. Beside hardware tokens or code generator apps, the...
View ArticleFile Blocking Shootout – Palo Alto vs. Fortinet
We needed to configure the Internet-facing firewall for a customer to block encrypted files such as protected PDF, ZIP, or Microsoft Office documents. We tested it with two next-generation firewalls,...
View ArticlePasswords vs. Private Keys
It is widely believed that public/private keys or certificates are “more secure” than passwords. E.g., an SSH login via key rather than using a password. Or a site-to-site VPN with certificate...
View ArticleIntro to NetworkMiner
This is a guest blogpost by Erik Hjelmvik, an expert in network forensics and network security monitoring at NETRESEC. Wireshark is the default goto tool for analyzing captured network traffic for most...
View Article
More Pages to Explore .....