password-protection

How does mvn --encrypt-master-password <password> work?

≡放荡痞女 提交于 2019-11-30 03:28:07
问题 I would like to know the algorithm or technique used by this command (mvn --encrypt-master-password ). Each time I run it produces a different output. I'm assuming that it takes system time as a seed parameter. 回答1: The encryption mechanism is not in the maven codebase per se. It is located on a library called plexus-cipher . It is always on the maven distribution. Mine is on lib/plexus-cipher-1.7.jar being 3.0.5 the maven version. The actual cipher is AES/CBC/PKCS5Padding . The key for the

Password protecting Rails site running on Nginx and Phusion Passenger

北慕城南 提交于 2019-11-30 03:00:11
问题 I want to protect my newly deployed Rails 3 app with the basic http authentication. It's running on the latest Nginx/Passenger and I'm using the following Nginx directive to protect the web root directory: location = / { auth_basic "Restricted"; auth_basic_user_file htpasswd; } htpasswd file was generated using Apache htpasswd utililty. However, after entering correct username and password I'm getting transferred to the 403 Forbidden error page. Analyzing Nginx error log revealed this:

How to store private encrypted user data in the database, but make them available to other chosen users?

三世轮回 提交于 2019-11-30 02:24:39
firstly, I apologize if my question sounds little confusing, I will try my best to describe my scenario as detailed as possible: I have website where user can input their personal data about themselves. They are mainly health data, so it's very private and sensitive information. So I need to encrypt this data on the server even then the server is compromised these data are secured because they will be encrypted with each user's password. Of course, user passwords will not be stored as clear-type text on the server, only password hashes. But my problem is that the website will offer "social

How do I securely store a .pfx password to use in MSBuild?

送分小仙女□ 提交于 2019-11-30 00:36:27
I need to add certificate signing to my build. Below is a sample of the working script I wrote, however it includes the password to the .pfx file. I can't keep the password in the build script. What are "best practices" or hacks that you would use in this type of situation? <ItemGroup Label="SignFiles"> <SignFilesInclude="$(FileLocation)\**\*.exe"/> </ItemGroup> <Exec Command="$(SignTool) sign /v /ac C:\MSCV-VSClass3.cer /f C:\Certificate.pfx /p Password /t http://timestamp.verisign.com/scripts/timestamp.dll %(SignFiles.Identity)"/> After googling, I read in multiple places that once you run

“Remember Me On This Computer” - How Should It Work?

旧时模样 提交于 2019-11-29 20:20:26
Looking at Gmail's cookies it's easy to see what's stored in the "remember me" cookie. The username/one-time-access-token. It could be implemented differently in cases where the username is secret, as well. But whatever... the thing is not very high security: you steal the cookie and you're ready to go. My question is on the functional side, however: when do you wipe their access tokens? If a user logs in without clicking "remember me" on another machine, should it invalidate their access tokens on all machines ? I'm asking about how this is traditionally implemented, and also how it should be

Good Practice: How to handle keystore passwords in android/java? [duplicate]

蓝咒 提交于 2019-11-29 20:04:13
问题 This question already has answers here : Handling passwords used for auth in source code (5 answers) Closed 4 years ago . Assuming that a password for a keystore is not supplied by or bound to a user password (which more or less means its just a String or Array[] in the code somewhere), is it a sufficient protection that it just cannot or can only hardly be extracted out of the bytecode? I know that the password for a keystore (JKS / BKS) is just used to verify the integrity of the keystore.

How do I implement salt into my login for passwords?

风流意气都作罢 提交于 2019-11-29 19:58:40
I want to implement a salt into my login system but am a bit confused on how this is supposed to work. I can't understand the logic behind it. I understand md5 is a one-way algorithm and all of the functions that I have come across seem to hash everything together. If this is the case, how does one get the password back out for comparison? My biggest question is, how is salting a users' password safer than just hashing the password? If a database was ever to be compromised, the hash along with the salt is in the database. Isn't this all that a hacker would need? I also found another post here

VBA password protection: how it works? is it secure? are there any alternatives?

 ̄綄美尐妖づ 提交于 2019-11-29 16:26:18
In case one wants to protect VBA applications to make trial(demo) versions and not to expose the scripts, how secure the built in password protection is? Are there any alternatives? Edit: I'm asking about Excel VBA here. Your password security is going to depend largely upon the version of office used. All other Office solutions prior to 2007 can be cracked. Office 2007 requires brute forcing the password. The default encryption mechanism is 128 bit AES. This means the higher the complexity of the password, the harder to crack. IE - Numbers, special characters, mixing case, etc. It's not very

Can I run my static website from an S3 Bucket, and add password protection?

那年仲夏 提交于 2019-11-29 16:09:06
问题 I'm running a static website completely from an Amazon S3 bucket, but I want to password protect my content. Is this possible? The type of authentication doesn't bother me, it just needs to be there, so that people can't just 'discover' my website. At the moment, I don't have a domain name set up, which I believe rules out http://www.s3auth.com/ as a possible solution. Are there any others? 回答1: AWS doesn't provide a way to do this directly right now. The S3auth solution you mentioned is nice

PHP dehashing the password

六眼飞鱼酱① 提交于 2019-11-29 14:25:23
Ok. thats clear that one must store hashed password in the database but in case a user does not remembers the password and want to retrieve it back, then obviously the user wont like to have the hashed password. If the password is hashed with md5 or additional like salt and sha1 then how to retrieve back the password. There is but one simple answer: You cannot. Well, theoretically you could, but it could take many years per password if they are long enough. After all, that is the point of hashing passwords in the first place: to make the data effectively useless to an attacker (or at least