Password

Home/Tag:Password

What is John the Ripper and How Does it Work?

2021-01-26T12:13:56+00:00Categories: Computer & Network Concepts|Tags: , , , , , , , , , , , , , , , , |

John the Ripper is a free password cracking software tool. It was designed to test password strength, brute-force encrypted (hashed) passwords, and crack passwords via dictionary attacks. John the Ripper is a part of the Rapid7 family of penetration testing/ hacking tools. Also, John is already installed on Kali Linux. First, we advocate for ethical [...]

Properties of a Strong Password

2020-09-20T09:07:01+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , |

One of the most important ways to ensure that your online interactions are safe and secure is to protect your passwords. Also, the more powerful your password, the harder it is for a hacker to invade your system. A strong password: Is at least 12 characters long Is a combination of uppercase letters, lowercase letters, [...]

Authentication Methods

2020-09-02T05:32:17+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , |

Authentication is the process of verifying the identity of a person or device. In fact, Authentication technology provides access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server. The authentication process always runs at the start of the [...]

Go to Top