79
79
data
eye 79
favorite 1
comment 0
This is a list of 600 Million unique plain-text passwords collected from about 100 of the largest database dumps from about a decade ending in the summer of 2018. I then generated NTLM, sha1, sha256, MySQL, and MD5 hashes from these passwords, which are contained in the files included in the download. [https://a.ndronic.us/pre-computed-hash-table-v-1-0/]
Topics: cracking, passwords, hash, passwords
Source: torrent:urn:sha1:c81e0644fd67f73d81b94a31e3fc726679638a98
Passwords are a commonly used method of access control for computer systems. Traditional passwords have been found to be inadequate. Passwords are generated from two sources: users and computer systems. User-selected passwords are easy to remember, but they might be easily guessed and therefore yield a lower degree of security. System-generated passwords usually offer a higher degree of security, but they are hard to remember and therefore meet with high user resistance. Because of this user...
Topics: computer security, access control, passwords, cognitive passwords
14
14
data
eye 14
favorite 0
comment 0
Topics: crack, passwphrases, passwords
14
14
data
eye 14
favorite 0
comment 0
Topics: warcacives, passwords, hacking
154
154
Nov 7, 2004
11/04
by
http://www.miklsoft.com
software
eye 154
favorite 0
comment 0
This program remembers your passwords and stores them in a protected file.
Topics: Passwords Base, System and utilities, Security, Password managers, Passwords Base
196
196
Nov 8, 2004
11/04
by
http://www.authord.com/PP
software
eye 196
favorite 0
comment 0
This program allows you to manage passwords and confidential information such as credit card numbers. Passwords Max can track, generate and automatically send passwords. It provides 6 encryption methods for encrypting files, and offers auto-shutdown, tray access, expiration date tracking and reporting.
Topics: Passwords Max, System and utilities, Security, Password managers, Passwords Max
In this paper we implemented a graphical authentication system which overcomes all drawbacks of existing authentication system. In this system we combine the features of D´ej`a Vu, Cued Click Points, Secret Draw technique and Text Passwords. In this system we used database of 20 images. In the password creation process, we provide 4 images randomly amongst database of 20 images. On first 3 images user can select click points and add single digit/text on that images. On the fourth image user...
Topics: Authentication, Graphical Passwords, Security
245
245
Apr 10, 2013
04/13
by
Gait, Jason
texts
eye 245
favorite 0
comment 0
"Issued August 1980."
Topic: Computers Access control Passwords.
6
6.0
texts
eye 6
favorite 0
comment 0
vii, 366 p. : 24 cm
Topic: Computers -- Access control -- Passwords -- Congresses
3
3.0
texts
eye 3
favorite 0
comment 0
x, 218 p. : 24 cm
Topic: Computers -- Access control -- Passwords -- Congresses
2
2.0
Jun 24, 2020
06/20
by
Cambridge Security Workshop (1993)
texts
eye 2
favorite 0
comment 0
ix, 221 p. : 24 cm
Topic: Computers -- Access control -- Passwords -- Congresses
A widely used access control mechanism is the password. Passwords are normally composed of a meaningful detail, such as a name of a person or a sequence of numbers such as birthdate. Any person attempting to gain unauthorized access to a system might need only to look at a personnel record or associate with the person holding the desired password in order to discover the password. Therefore, there is a compromise between user memorability and security of a system. Exploration into other methods...
Topics: Computer security, Data protection., Information system security, authentication, cognitive...
This thesis reports the results of a study which tested participants' abilities to recall five different types of computer passwords. Each participant was assigned in a randomized procedure to one of six response intervals. Recall testing of computer-generated passwords, user-created passwords, passphrases, associative passwords and cognitive passwords was conducted using a computer program which simulated log-on procedures. This study indicates the relative merits of these five password types...
Topics: Computer security, User identification, Passwords
5
5.0
Apr 30, 2022
04/22
by
Prof. Mrinal Khadse, Vidya Dandinashivara, Shruti Nair, Nikita Paspunatu
texts
eye 5
favorite 0
comment 0
Humongous amount of data and information are generated by users everyday which are private, thus needed to be secured and protected. We are using the concept of honeywords to increase the security of the system. Honeywords are basically dummy passwords created by the system which is stored along with the actual user password. When an adversary steals the password file and tries one of the honeywords, the user is immediately informed about this activity.
Topics: Passwords, Authentication, Honeywords, Security, login
The most widely used mechanism for access control to information systems is passwords. Passwords can be machine-generated using a list of words stored in a memory bank, machine-generated using a sophisticated algorithm to create a pseudo-random combination of characters or they can be user-generated. User-generated passwords typically take on the characteristics of some type of meaningful detail that is simple in structure and easy to remember. Memorability and security pose a difficult...
Topics: Computer security., Data protection, Passwords, computer security, informaiton system security,...
235
235
Nov 3, 2004
11/04
by
http://www.odarn.com/
software
eye 235
favorite 0
comment 0
This keeps track of all those pesky passwords you need for the Internet, online services, financial sites, and other secure programs. You remember one password and this tool keeps track of all the rest. It remembers URLs of password-protected Web sites.
Topics: Darn Passwords, System and utilities, Security, Password managers, canada, us, security,...
22
22
web
eye 22
favorite 1
comment 0
User-Names-and-Passwords dumped with WikiTeam tools.
Topics: wiki, wikiteam, wikispaces, User-Names-and-Passwords, user-names-and-passwords,...
66
66
Nov 20, 2013
11/13
by
Harry Katzan
texts
eye 66
favorite 1
comment 0
Topics: Computer security -- Passwords., Data encryption (Computer science)
15
15
Mar 12, 2014
03/14
by
Nebraska Library Commission
movies
eye 15
favorite 0
comment 0
How many passwords do you have to remember for your library? How many are for your own library accounts? How many are for the library’s databases or materials accounts? For social networking? Are these passwords secure? Safe? How many of those passwords must be shared with your coworkers? Libraries everywhere struggle with passwords every day, and security is always a concern. Attend this session to learn how to ensure your passwords are safe, secure, and easily managed. Presenter: Jezmynne...
Topics: Nebraska, library, libraries, librarian, librarians, passwords, security
43
43
movies
eye 43
favorite 0
comment 0
Protect your data with a different strong password for each service and easily retrieve those passwords using the encrypted KeePassX software.
Topics: technology, keepassx, linux, mac, windows, security, passwords, encryption, online, protection,...
Access control of computing systems is considered a key issue among Information Systems managers. There are different methods available to computing systems to ensure a proper authentication of a user. Authentication mechanisms can use simple user-generated passwords to complicated combinations of passwords and physical characteristics of the user (i.e., voice recognition device, retina scanner, signature recognition device, etc.). This thesis looks at the various authentication mechanisms...
Topics: Access Control, User Authentication, Passwords, Information System Security
Password-based user identification and authentication in a network-based operating system generally relies upon a single file that contains user information and the encoded or hashed representations of each users' password. Operating system designers have resorted to various protection schemes to prevent unauthorized access to this single file. These techniques have proved vulnerable to various attacks, the result being unauthorized access to the targeted computer system. This paper proposes a...
Topics: Computers, Access control, Passwords, Data encryption (Computer science)
One of the most important topics in information security today is user authentication. User authentication is a fundamental component in most computer security contexts. It provides the basis for access control and user accountability. While there are various types of user authentication systems, alphanumeric passwords are the most common type of user authentication. They are versatile and easy to implement and use. However, it can either be long and secure or short and hard to remember. A...
Topics: Electronics & Communication Engineering, Authentication, Graphical Passwords, Images...
19
19
Jul 15, 2018
07/18
by
Miller, Shannon (Shannon McClintock)
texts
eye 19
favorite 0
comment 0
24 pages : 19 x 21 cm
Topics: Computers -- Access control -- Passwords -- Juvenile literature, Internet -- Security measures --...
Password cracking requires significant processing power, which in today's world is located at a workstation or home in the form of a desktop computer. Berkeley Open Infrastructure for Network Computing (BOINC) is the conduit to this significant source of processing power and John the Ripper is the key. BOINC is a distributed data processing system that incorporates client-server relationships to generically process data. The BOINC structure supports any system that requires large amounts of...
Topics: Computers, Access control, Passwords, Computer security, Data encryption (Computer science)
Josh and Kurt talk to a 7 year old about security. We cover Minecraft security, passwords, hacking, and many many other nuggets of wisdom.]]>
Topics: Podcast, cybersecurity, open, opensource, security, sourcepassword, hacking, passwords, minecraft
This is a copy of the Genesis Collective Offline Windows HTML Help File, originally available from the now defunct www.genesiscollective.com . Details from the ReadMe: Genesis Collective Offline Windows HTML Help File Genesis Collective Offline (GCOffline) is an offline version of the Genesis Collective website (http://www.GenesisCollective.com). GCOffline currently contains the text information from the Genesis database, including all reviews, Game Genie codes, Pro Action Replay codes, hints,...
Topics: sega, genesis, megadrive, games, console, cheats, reviews, screenshots, passwords, hints
From the bitsavers.org collection, a scanned-in computer-related document. sds :: sigma :: cp-v :: CP-V listing revD00B sep75 :: scran
Topics: equ, eou, hoi, seed, scram, passwords, csect, scro, oooooooo, ooooo
124
124
Nov 7, 2004
11/04
by
http://www.sowsoft.com/bigcroc.htm
software
eye 124
favorite 0
comment 0
Keep all of your passwords, logins and hyperlinks in a securely encrypted file. This program can automatically insert the passwords into the windows that require them. It also has a password generator with advanced functions, a multiple file interface and special password folders.
Topics: Big Crocodile, System and utilities, Security, Password managers, PASSWORDS, Big Crocodile
Josh and Kurt talk about change your password day (what a terrible day). Google's password checkup (not a terrible idea), an AI finding new spice flavors we expect will one day take over the world, and we finish up on a new DoD cloud strategy. Also Josh burnt his finger, but is going to be OK.]]>
Topics: Podcast, cybersecurity, open, opensource, security, sourcepassword, passwords, ai, spices, dod
65
65
Jul 9, 2019
07/19
by
Hak5
movies
eye 65
favorite 0
comment 0
Segment from Hak5 1x10 - Cracking Windows passwords with PWDUMP and Rainbow Tables Distributed by Tubemogul. -~-~~-~~~-~~-~- Please watch: "Bash Bunny Primer - Hak5 2225" https://www.youtube.com/watch?v=8j6hrjSrJaM -~-~~-~~~-~~-~- Source: https://www.youtube.com/watch?v=PmwlkyTomVs Uploader: Hak5
Topics: Youtube, video, Howto & Style, cracking, hak5, passwords, pwdump, rainbow, table, windows
One Way Hackers Steal Passwords from a Unix System Full Tutorial: https://nulb.app/x4iia Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 137 (Recut - Partial Episode) Bash scripting is incredibly useful for automating frequently used commands. However, if a malicious bash function is saved to a Linux or macOS system, it can be used to steal all kinds of data. Today, on this episode of Cyber Weapons Lab, we'll show you how a...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Josh and Kurt talk about Twitter doing the right thing when they logged a lot of passwords and the npm malicious getcookies package and how backdoors work in code.]]>
Topics: Podcast, cybersecurity, open, opensource, security, sourcetwitter, password, passwords, backdoor,...
5
5.0
Jan 9, 2020
01/20
by
FSE 2002 (2002 : Louvain, Belgium)
texts
eye 5
favorite 1
comment 0
xi, 276 p. : 24 cm
Topics: Computers -- Access control -- Passwords -- Congresses, Data encryption (Computer science) --...
18
18
Jul 18, 2021
07/21
by
Held, Gilbert, 1943-
texts
eye 18
favorite 1
comment 0
218 p. : 23 cm. +
Topics: Computers -- Access control -- Passwords, Cryptography, Data protection, Data encryption (Computer...
1,954
2.0K
Mar 7, 2022
03/22
by
CryptoNickSoft
software
eye 1,954
favorite 5
comment 0
Windows Login Unlocker v1.6 Full based on Windows PE: " Reset, edit Windows passwords and Microsoft account ". Versión: 1.6 Edición/Edition: Completa - Full Idioma/Language: Inglés - English Tipo/Tipe: ISO Arrancable - Bootable Tamaño/Size: 296 MB Autor/Author: CryptoNickSoft Asistencia técnica/Technical assistance: Nikzzzz Idea, desarrollo, interface, test/Idea, development, interface, test: Joker-2013 Video: How to Bypass Windows Login Password - YouTube
Topics: quitar contraseñas, reset passwords, reset microsoft account password, wimpe, windows pe
Club Nintendo Edición Especial S. O. S (México) Julio de 1992
Topics: Club Nintendo, México, edición especial, SOS, Trucos, Passwords, claves, mapas, estrategias
Club Nintendo Edición Especial S. O. S (Argentina) Noviembre de 1993
Topics: Club Nintendo, Argentina, edición especial, SOS, Trucos, Passwords, claves, mapas, estrategias
112
112
Mar 14, 2018
03/18
by
Bosworth, Bruce
texts
eye 112
favorite 5
comment 0
Includes bibliographical references and index
Topics: Cryptography, Computers, Data protection, Computer, Kryptologie, Zugriffskontrolle, Computers --...
9,711
9.7K
Nov 7, 2004
11/04
by
http://www.sensiva.com
software
eye 9,711
favorite 3
comment 1
Now you can instantly access your online accounts, control your software applications and navigate to favorite sites without ever typing another word or remembering a password. Symbol Commander eliminates repetitive tasks.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Symbol Commander, System and utilities, Security, Password managers, password, lost, passwords
22
22
Feb 5, 2020
02/20
by
Pugh, Steve
texts
eye 22
favorite 1
comment 0
xxiv, 189 pages : 24 cm
Topics: Ruby (Computer program language), Macro instructions (Electronic computers), Computers -- Access...
generalmanual 000052937
Topics: turbopasswords, software, web, handheld, chapura, vpass, passwords, password, access, favorite, web...
World of Knowledge March 2016
Topics: sleep, hitler, nazi, passwords, lamprey, nazis, password, bauer, sas, secret, bauer media, stolen...
11
11
Aug 15, 2021
08/21
by
Burnett, Mark
texts
eye 11
favorite 1
comment 0
1 online resource (xv, 181 pages) :
Topics: Computers -- Access control -- Passwords, COMPUTERS -- Internet -- Security, COMPUTERS --...
44
44
movies
eye 44
favorite 0
comment 0
Alex Willmer - Taking the pain out of passwords and authentication [EuroPython 2015] [23 July 2015] [Bilbao, Euskadi, Spain] Passwords are a pain for us all - programmers, users and admins alike. How can we reduce that pain, or eliminate it entirely? This talk will - Review research into techniques that improve the usability of password systems, and mitigate shortcomings - Introduce the new standards Universal Authentication Framework (UAF) & Universal Second Factor (U2F) - Describe how...
Topics: experience, u2f, web, authentication, 2fa, passwords, security, fido, 2-factor, uaf,...
How to Brute-Force Web App Credentials with Hatch Full Tutorial: http://bit.ly/HatchWin Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Brute-forcing is an essential hacking technique that's easier with certain services than others. Website login pages are frequent victims to attack and today we'll show you how easy it can be, even for a beginner, with a Python tool called Hatch, on this episode of Cyber Weapons Lab. Follow Null Byte on: Twitter:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Nintendo Player's Guide Top Secret Passwords (1992)
Topics: stage, passwords, select, nintendo, password, pass, level, nes, secret, press, stage select, top...
Club Nintendo Edición Especial Enciclopedia (Colombia) Visita ScanClubNintendo
Topics: Club Nintendo, Colombia, Edición Especial, Enciclopedia, trucos, passwords, Super Nintendo,...
Hatch Can Brute-Force Web App Credentials Full Video: https://nulb.app/z4gw5 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 066 (Recut - Partial Episode) Brute-forcing is an essential hacking technique that's easier with certain services than others. Website login pages are frequent victims to attack. On this episode of Cyber Weapons Lab, we'll show you how easy it can be for a hacker or pentester, even if they're a...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
11
11
Jul 20, 2020
07/20
by
Burnett, Mark
texts
eye 11
favorite 0
comment 0
1 online resource (xv, 181 pages) :
Topics: Computers -- Access control -- Passwords, COMPUTERS -- Internet -- Security, COMPUTERS --...