password-encryption

Best way encrypt password php (in 2017) [duplicate]

痞子三分冷 提交于 2019-12-20 09:49:04
问题 This question already has answers here : Secure hash and salt for PHP passwords (14 answers) Closed 2 years ago . In my website I use md5 to crypt password user in my database (and store session user) $pswUser = md5($_POST["password"]); But I have just been told that this way of encrypting has become obsolete I did some research to find out how to do it but most of the posts dates from two or three years ago So what is the best way to encrypt password in 2017 ? Thank you Isn't duplicate

How do I avoid saving usernames and passwords in PowerShell scripts

耗尽温柔 提交于 2019-12-19 11:57:17
问题 So basically I want to write a Powershell script which will export the last 1days worth of Backup Logs for Windows Server Backup, format the info into a nice little table, then SMTP send it to an external location outside of the customers local Exchange. I have a smarthost I can use for this purpose, and the credentials etc. But I don't want to store the UN and Password in the Powershell in plain text, or have the script running using the credentials in plain text. Is there a way around this?

Maximum length of generated hash when using password_hash?

淺唱寂寞╮ 提交于 2019-12-18 04:42:40
问题 I'm using password_hash($password, PASSWORD_BCRYPT); for crypt password to store on a database. As i read, there's no lenght limit on generated hashes, but i need to put a limit for create a field on my database could fit all password (in worst case scenario). If i put a limit of 20 character for password in plain text, how password_hahs() result will be long? 回答1: From the password_hash documentation: The following algorithms are currently supported: PASSWORD_DEFAULT - Use the bcrypt

Storing password salts separately from password hashes? [duplicate]

戏子无情 提交于 2019-12-13 21:04:44
问题 This question already has answers here : Closed 7 years ago . Possible Duplicate: what is best possible way of salting and storing salt? Improve password hashing with a random salt Assuming that using a correct algorithm for password hashing and generating different salts for each password... Is it a security risk to store salts separately from password hashes? For ex. in a database table, storing password hashes in one column, and password salts in a separate column? I saw strategies where

Generate a 128-bit string in C#

女生的网名这么多〃 提交于 2019-12-13 04:29:44
问题 I am developing a class project in C# that encrypts the users and admins passwords. To encrypt I'm using the TripleDESCryptoServiceProvider . In the configuration app the user enters the key to be used for encryption and decryption of the passwords. I want to have a button to generate a key to help the user but I'm at a loss as to how I generate the 128 bits randomly. How a generate a key with 128-bits? 回答1: To generate a random value for crypto use, you should use RNGCryptoServiceProvider:

Storing credentials for automated use

旧街凉风 提交于 2019-12-12 10:43:25
问题 I've already looked around, and since i'm no security or encryption expert, I am still confused on how to implement encryption in my program. I need a server to login to its gitHub account to update code files with special headers. The only hang-up I have right now is how to store/retrieve the server's credentials. PushOptions push = new PushOptions { Credentials = new UsernamePasswordCredentials { Password = "password", Username = "Username" } }; How would I encrypt these credentials for

How to hide the password in the command “java -Djasypt.encryptor.password=somepassword -jar name.jar”

断了今生、忘了曾经 提交于 2019-12-12 10:13:24
问题 I am using Jasypt encryption and specifying the property value within ENC() in the properties file. The decryption password is sent through the command-line argument like this java -Djasypt.encryptor.password=somepassword -jar name.jar . Everything is working fine but the problem is when I search for the running process, it shows the password as well. Is there a way to hide the encryption password as well by read it from somewhere? I thought of using the environment variables but that could

Can I improve the security of MD5 hashed passwords by salting the existing MD5 hash and hash the result using Scrypt or PBKDF2 HMACSHA256?

痴心易碎 提交于 2019-12-12 08:54:47
问题 I have a database of legacy passwords that were salted and hashed using MD5. I would like to update the system so that the data is more secure. The first option is to transition the users to a new hashing scheme (Salt + Scrypt or PBKDF2 HMACSHA256) when they login and deactivate old users after a certain period of time so they have to use the password recovery feature which would automatically update their hash. Another option that would allow me to instantly upgrade everyone would be to take

mvn --encrypt-master-password <password> : Good practice for choosing <password>? Which level of privacy should it be?

喜夏-厌秋 提交于 2019-12-12 07:47:14
问题 I am learning to use maven password encryption capabilities and I would like to know how to choose the parameter <password> . There are two things that I don't understand: 1) mvn --encrypt-master-password foobar will always give a different encrypted master password . Since the encrypted master password is always different, I see only two possibilities: A local property is stored somewhere so that it can be used to decrypt the encrypted master password to get the master password . That means

Updating encrypted password-hash stored in XML file to sync with domain password changes

假如想象 提交于 2019-12-12 00:42:55
问题 Is there a way to automate the task of keeping the settings.xml (used by Maven) in sync with domain password changes? The list of repos in settings.xml is growing as more development migrates to maven, and so the task of updating is also growing. We've recently started using maven with some internal (corporate) svn repositories that use each developer's domain user ID and password to control their repository access. Our domain passwords expire and must be changed frequently. Which means