Tagged articles
13 articles
Page 1 of 1
IT Services Circle
IT Services Circle
Oct 21, 2024 · Information Security

Understanding Microsoft Account Fatigue Attacks and Security Recommendations

The article explains how fatigue attacks target Microsoft accounts by repeatedly sending login prompts, describes Microsoft's new numeric verification safeguard, and offers practical security measures such as changing passwords, using passkeys, switching to alternative authenticators, and updating the linked email to protect personal data.

Fatigue AttackMicrosoftPasskey
0 likes · 5 min read
Understanding Microsoft Account Fatigue Attacks and Security Recommendations
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Aug 29, 2023 · Information Security

Top 5 VS Code Extensions for Enhancing Code Security

This article introduces five essential Visual Studio Code extensions—1Password, Decompiler, Cloak, ESLint, and Snyk—that help developers securely manage secrets, decompile binaries, hide sensitive values, enforce safe coding standards, and automatically scan for vulnerabilities within the editor.

CloakCode ScanningPassword Management
0 likes · 11 min read
Top 5 VS Code Extensions for Enhancing Code Security
Liangxu Linux
Liangxu Linux
May 22, 2023 · Information Security

Force Linux Users to Change Their Password at Next Login

This guide explains how system administrators can require Linux users to reset their passwords on the next login by adjusting the minimum password age with chage or expiring the password using the passwd command, and provides step‑by‑step instructions.

LinuxPassword ManagementSystem Administration
0 likes · 4 min read
Force Linux Users to Change Their Password at Next Login
Liangxu Linux
Liangxu Linux
Apr 23, 2023 · Information Security

Force Users to Change Their Linux Password on Next Login

Learn how to enforce password changes for Linux users by adjusting the minimum password age with chage or expiring the password using passwd, ensuring stronger security while providing clear step‑by‑step commands and execution guidance.

LinuxPassword ManagementSecurity
0 likes · 4 min read
Force Users to Change Their Linux Password on Next Login
Programmer DD
Programmer DD
Dec 1, 2022 · Information Security

What the 2022 NordPass Study Reveals About the World's Weakest Passwords

NordPass analyzed a 3 TB dataset from 30 countries to identify the most common 2022 passwords, showing that weak, easily guessable passwords still dominate, cultural trends affect password choices, and providing practical advice for improving online security.

NordPassPassword Managementcommon passwords
0 likes · 5 min read
What the 2022 NordPass Study Reveals About the World's Weakest Passwords
Programmer DD
Programmer DD
Nov 26, 2020 · Information Security

What the 2020 Most Common Passwords Reveal About Your Online Security

A recent NordPass analysis of the 200 most common passwords in 2020 shows why simple strings like "123456" dominate, how millions of accounts are exposed, and offers practical advice on creating stronger, unique passwords to protect against breaches and phishing attacks.

NordPassPassword Managementcommon passwords
0 likes · 6 min read
What the 2020 Most Common Passwords Reveal About Your Online Security
Tencent Cloud Developer
Tencent Cloud Developer
Apr 14, 2020 · Cloud Computing

Deploying a Private Bitwarden Password Manager on Tencent Cloud

This guide walks you through deploying a low‑cost, private Bitwarden password manager on Tencent Cloud by preparing a domain and SSL certificate, installing Docker on a CentOS CVM, running Bitwarden and Nginx containers, optionally enabling CDN, configuring backups to COS, and applying security hardening such as two‑factor authentication.

BackupBitwardenCDN
0 likes · 18 min read
Deploying a Private Bitwarden Password Manager on Tencent Cloud
ITPUB
ITPUB
Mar 30, 2020 · Information Security

Why Ubuntu Keeps Asking for Keyring Password and How to Resolve It

If you enable automatic login on Ubuntu or other Linux distributions, you may repeatedly see prompts to unlock the login keyring, especially when using browsers that store passwords, and this guide explains the keyring concept, its security role, and step‑by‑step methods to change or disable its password.

GNOMEKeyringLinux
0 likes · 8 min read
Why Ubuntu Keeps Asking for Keyring Password and How to Resolve It
Open Source Linux
Open Source Linux
Mar 29, 2020 · Operations

Automate Bulk Linux Root Password Changes with Expect Scripts

Learn how to efficiently update root passwords across dozens or hundreds of Linux servers by creating Expect scripts that automate SSH logins, parse IP and password lists, and execute batch password changes, complete with step-by-step instructions, required environment setup, and script explanations.

AutomationLinuxPassword Management
0 likes · 5 min read
Automate Bulk Linux Root Password Changes with Expect Scripts
FunTester
FunTester
Jul 24, 2019 · Backend Development

Groovy‑Based Automated API Testing Framework for Password Modification

This article presents a Groovy‑driven, modular API testing framework that automates login, token handling, and password‑change requests using multithreaded execution, and includes full source code for the test driver, UserCenter, and OkayBase classes.

API testingAutomationBackend
0 likes · 5 min read
Groovy‑Based Automated API Testing Framework for Password Modification