Tagged articles
20 articles
Page 1 of 1
IT Services Circle
IT Services Circle
May 15, 2025 · Information Security

Critical RDP Vulnerability Allows Persistent Access with Revoked Microsoft/Azure Passwords

A newly disclosed critical vulnerability in Windows Remote Desktop Protocol (RDP) lets attackers bypass cloud authentication and maintain permanent access using revoked Microsoft or Azure account passwords, even after password changes, while Microsoft treats the issue as a design decision rather than a bug.

AuthenticationAzureMicrosoft
0 likes · 5 min read
Critical RDP Vulnerability Allows Persistent Access with Revoked Microsoft/Azure Passwords
IT Services Circle
IT Services Circle
Oct 27, 2024 · Information Security

Understanding Password Salting: Why It Matters, How to Generate and Use It, and Additional Security Measures

This article explains what password salting is, why it is essential for protecting stored passwords against rainbow‑table and brute‑force attacks, outlines step‑by‑step how to generate, apply, and verify salted hashes, and lists additional best practices for enhancing overall credential security.

AuthenticationHashingpassword
0 likes · 5 min read
Understanding Password Salting: Why It Matters, How to Generate and Use It, and Additional Security Measures
Alibaba Cloud Developer
Alibaba Cloud Developer
Jan 28, 2023 · Backend Development

Designing a Scalable User Authentication Model: From Simple Login to Real‑Person Verification

This article walks through the evolution of a user system—from a basic email/phone login to third‑party OAuth, multi‑type user accounts, diversified password schemes, and real‑person (entity) verification—showcasing a flexible, extensible backend design that can handle rapid business growth.

AuthenticationSystem DesignUser Management
0 likes · 13 min read
Designing a Scalable User Authentication Model: From Simple Login to Real‑Person Verification
Aikesheng Open Source Community
Aikesheng Open Source Community
Oct 8, 2022 · Databases

Handling Special Characters in MySQL Passwords: Issues with $ and #

The article explains why MySQL users created with passwords containing special characters like "$" or "#" may fail to log in, analyzes how shell quoting affects the stored password, demonstrates the problem with scripts and login‑path, and provides practical work‑arounds and version notes.

Special Charactersauthentication_stringlogin-path bug
0 likes · 8 min read
Handling Special Characters in MySQL Passwords: Issues with $ and #
Open Source Linux
Open Source Linux
Nov 8, 2020 · Databases

Master MySQL 8.0 Installation: YUM, Binary, Multi‑Instance Setup & Common Pitfalls

This guide walks you through removing old MySQL versions, installing MySQL 8.0 via YUM or binary packages, configuring a secure initial password, setting up multiple instances on different ports, and addressing typical MySQL 8.0 pitfalls such as user creation, remote root access, authentication plugins, and character set settings.

InstallationLinuxMulti-Instance
0 likes · 21 min read
Master MySQL 8.0 Installation: YUM, Binary, Multi‑Instance Setup & Common Pitfalls
Liangxu Linux
Liangxu Linux
Sep 19, 2020 · Operations

Enable or Disable Ubuntu’s Root Account in Minutes

Learn step‑by‑step how to activate the root user on Ubuntu, assign a password, configure sudo for password‑less access, and later lock or disable the root account by expiring its password, with clear command examples and safety tips.

$rootLinuxSudo
0 likes · 4 min read
Enable or Disable Ubuntu’s Root Account in Minutes
MaGe Linux Operations
MaGe Linux Operations
Jan 26, 2019 · Backend Development

Hijack Windows Login Passwords with a Python Socket Script

This tutorial shows how to create a Python client‑server pair that randomly generates a new Windows login password on a target machine, sends it over a socket to your server, and demonstrates how to revert the change using built‑in commands.

NetworkingSocketWindows
0 likes · 5 min read
Hijack Windows Login Passwords with a Python Socket Script
MaGe Linux Operations
MaGe Linux Operations
Mar 27, 2017 · Information Security

Top 10 Enterprise Linux Server Security Practices You Must Implement

This guide outlines ten essential security measures for enterprise Linux servers, covering password management, network service restriction, user account controls, root privilege handling, logging, firewall and IDS integration, vulnerability tracking, and regular patch updates to strengthen system protection.

SecurityServerfirewall
0 likes · 14 min read
Top 10 Enterprise Linux Server Security Practices You Must Implement
ITPUB
ITPUB
Nov 2, 2016 · Operations

10 Creative Linux Commands to Generate Secure Random Passwords

This guide presents ten distinct Linux command‑line techniques—including SHA‑based hashing, OpenSSL, /dev/urandom filtering, dd, and custom Bash functions—to quickly produce strong, random passwords of configurable length, each illustrated with sample output.

BashLinuxSecurity
0 likes · 5 min read
10 Creative Linux Commands to Generate Secure Random Passwords
Ctrip Technology
Ctrip Technology
Oct 24, 2016 · Information Security

User Password Encryption and Cracking Techniques

This article explains common user password storage methods, compares their security characteristics, and details various cracking approaches—including hash collisions, rainbow tables, and advanced algorithms like PBKDF2, bcrypt, and scrypt—while emphasizing the importance of strong encryption to mitigate data breach risks.

HashingPBKDF2Security
0 likes · 8 min read
User Password Encryption and Cracking Techniques
ITPUB
ITPUB
Oct 23, 2016 · Information Security

10 Clever Linux Commands to Generate Strong Random Passwords

This guide walks through ten distinct Linux command‑line techniques—including date hashing, /dev/urandom filtering, OpenSSL, tr, strings, dd, and custom shell functions—to quickly produce secure, random passwords of configurable length for any environment.

Securitypasswordrandom
0 likes · 6 min read
10 Clever Linux Commands to Generate Strong Random Passwords
ITPUB
ITPUB
Jun 13, 2016 · Databases

How to Connect to Oracle When Your Password Contains an @ Symbol

When an Oracle user password includes the '@' character, standard sqlplus login fails with a connection string parsing error; escaping the '@' by using backslashes or enclosing the password in double quotes restores successful connection.

Database ConnectionEscape CharacterOracle
0 likes · 3 min read
How to Connect to Oracle When Your Password Contains an @ Symbol
MaGe Linux Operations
MaGe Linux Operations
Jul 7, 2014 · Operations

10 Powerful Linux Commands to Generate Random Passwords

This article presents ten tested Linux command‑line techniques for generating random passwords, each easily adjustable for length and suitable for use on Linux, Cygwin‑enabled Windows, and even macOS, offering practical options for sysadmins and developers.

command-linepasswordrandom
0 likes · 5 min read
10 Powerful Linux Commands to Generate Random Passwords