Tag

password security

1 views collected around this technical thread.

Java Tech Enthusiast
Java Tech Enthusiast
May 22, 2025 · Information Security

Chrome’s Automatic Password Change Feature and Implementation Guidelines for Websites

Google Chrome now offers an automatic password‑change function that detects leaked credentials, generates strong passwords, and updates them with minimal user effort, while websites must adopt specific autocomplete attributes and change‑password URLs to integrate seamlessly with this security enhancement.

Auto-Password ChangeChromeInformation Security
0 likes · 5 min read
Chrome’s Automatic Password Change Feature and Implementation Guidelines for Websites
php中文网 Courses
php中文网 Courses
May 7, 2025 · Backend Development

How to Strengthen Website Password Security Using PHP

This article explains how to improve website password security in PHP by using modern hash functions, adding random salts, employing built‑in password hashing APIs, enforcing strong password policies, scheduling regular password changes, and implementing measures to prevent brute‑force attacks.

HashingPHPbest practices
0 likes · 5 min read
How to Strengthen Website Password Security Using PHP
php中文网 Courses
php中文网 Courses
Dec 27, 2024 · Backend Development

Using PHP password_hash for Secure Password Hashing

This article explains how PHP's password_hash function creates cryptographically strong, salted password hashes, demonstrates its usage with example code, and shows how to verify passwords securely using password_verify, emphasizing best practices for backend security.

BackendHashingPHP
0 likes · 4 min read
Using PHP password_hash for Secure Password Hashing
Top Architecture Tech Stack
Top Architecture Tech Stack
Oct 21, 2024 · Information Security

Meta fined €91 million for storing passwords in plain text – a GDPR compliance warning

Meta was fined €91 million by Ireland’s Data Protection Commission for storing user passwords in plain text, violating multiple GDPR provisions and highlighting the critical need for proper encryption and data‑security measures in large‑scale online services.

ComplianceData EncryptionGDPR
0 likes · 4 min read
Meta fined €91 million for storing passwords in plain text – a GDPR compliance warning
DevOps Operations Practice
DevOps Operations Practice
Jun 11, 2024 · Information Security

Common Weak Passwords and Best Practices for Secure Password Creation

The article presents NordPass's annual most‑used password list, highlights the top ten weak passwords in China that can be cracked in seconds, explains why users choose them, and offers four practical recommendations for creating stronger, more secure passwords.

Information SecurityNordPassbest practices
0 likes · 3 min read
Common Weak Passwords and Best Practices for Secure Password Creation
Java Tech Enthusiast
Java Tech Enthusiast
Apr 13, 2024 · Information Security

Why Websites Require Password Reset Instead of Revealing Original Passwords

Websites cannot reveal original passwords because they store only salted, one‑way hashes, not the plaintext, making recovery impossible; therefore, when users forget their credentials, the secure approach is to verify identity and issue a password reset rather than expose any stored data.

HashingMD5authentication
0 likes · 6 min read
Why Websites Require Password Reset Instead of Revealing Original Passwords
php中文网 Courses
php中文网 Courses
Jan 3, 2024 · Backend Development

How to Strengthen Website Password Security Using PHP

This article explains how to enhance website password security in PHP by using hash functions, adding salts, employing password_hash and password_verify, enforcing strong password policies, scheduling regular password changes, and implementing measures against brute‑force attacks.

BackendHashingWeb Development
0 likes · 5 min read
How to Strengthen Website Password Security Using PHP
IT Services Circle
IT Services Circle
Oct 12, 2022 · Information Security

Rethinking Password Complexity: Favor Length, Managers, and Multi‑Factor Authentication

The article argues that traditional password complexity rules and periodic resets are outdated, advocating for longer passwords, the use of password managers and multi‑factor authentication, and limiting login attempts to improve security in modern, always‑connected systems.

Information SecurityMFANIST
0 likes · 5 min read
Rethinking Password Complexity: Favor Length, Managers, and Multi‑Factor Authentication
Top Architect
Top Architect
Feb 24, 2021 · Information Security

The Mystery of the Password “ji32k7au4a83” and How to Create Strong Passwords

The article explains why the rare password “ji32k7au4a83” appears in breach data, traces its origin to the Chinese Zhuyin phonetic system, presents statistics on common passwords, and offers expert advice on crafting secure, long, and varied passwords.

Information Securitydata breachpassword best practices
0 likes · 4 min read
The Mystery of the Password “ji32k7au4a83” and How to Create Strong Passwords
Python Programming Learning Circle
Python Programming Learning Circle
Jan 21, 2021 · Information Security

The Mystery of Password “ji32k7au4a83” and How to Choose Secure Passwords

The article explains why the seemingly random password “ji32k7au4a83” appears in breach data, traces its origin to the Chinese Zhuyin phonetic system, and provides practical recommendations for creating strong, hard‑to‑guess passwords.

Chinese ZhuyinInformation Securitycommon passwords
0 likes · 4 min read
The Mystery of Password “ji32k7au4a83” and How to Choose Secure Passwords
macrozheng
macrozheng
Jan 7, 2021 · Information Security

How to Securely Transmit and Store User Passwords: HTTPS, Encryption, and Bcrypt

This article explains why transmitting passwords over plain HTTP is unsafe, introduces HTTPS and its TLS encryption process, compares symmetric and asymmetric encryption methods, and recommends secure password storage techniques such as salted hashing and BCrypt to protect against rainbow‑table and brute‑force attacks.

EncryptionHTTPSHashing
0 likes · 11 min read
How to Securely Transmit and Store User Passwords: HTTPS, Encryption, and Bcrypt
Aikesheng Open Source Community
Aikesheng Open Source Community
Nov 23, 2020 · Databases

Resolving MySQL 5.7 Login Issue Caused by the auth_socket Plugin and Exploring Its Use Cases

The article describes a puzzling MySQL 5.7 situation where any password works, investigates the cause as the auth_socket authentication plugin, provides exact SQL commands to fix the issue, and explains the plugin's security characteristics and appropriate deployment scenarios.

Database TroubleshootingMySQLauth_socket
0 likes · 5 min read
Resolving MySQL 5.7 Login Issue Caused by the auth_socket Plugin and Exploring Its Use Cases
Architects Research Society
Architects Research Society
Sep 21, 2019 · Information Security

12 Best Cybersecurity Practices for 2019

This article outlines twelve essential cybersecurity practices for 2019, covering biometric authentication, tiered security policies, risk‑based approaches, regular backups, IoT security, multi‑factor authentication, password management, least‑privilege principles, privileged‑user monitoring, third‑party access control, phishing awareness, and employee training.

Information SecurityIoT securityMFA
0 likes · 18 min read
12 Best Cybersecurity Practices for 2019
Efficient Ops
Efficient Ops
Jun 13, 2018 · Information Security

AcFun Data Breach Exposes Millions – How to Safeguard Your Account

In early June, AcFun announced a massive hack that leaked nearly ten million user records, including IDs, nicknames and encrypted passwords, urging users—especially those who haven’t logged in since July 2017 or use weak passwords—to change them immediately, while noting that the data is already being sold on the dark web.

AcFunInformation Securitydark web
0 likes · 4 min read
AcFun Data Breach Exposes Millions – How to Safeguard Your Account
Architect's Tech Stack
Architect's Tech Stack
May 11, 2018 · Information Security

Understanding Password Encryption, Transmission, and Secure Storage

This article explains how passwords should be encrypted during transmission using symmetric and asymmetric methods such as RSA, why HTTPS is essential, how services like GitHub and Baidu handle login security, and best practices for securely storing passwords with hashing, salting, and strong algorithms like BCrypt and PBKDF2.

EncryptionHTTPSHashing
0 likes · 11 min read
Understanding Password Encryption, Transmission, and Secure Storage
DevOps
DevOps
Mar 17, 2016 · Information Security

How to Create Memorable Yet Hard-to-Guess Passwords

This article shares practical techniques for generating passwords that are easy to remember but difficult for others to guess, including using initials of poems, personal info combined with app names and random numbers, and custom keyboard patterns, while emphasizing the importance of a consistent rule.

Information SecurityPassword generationbest practices
0 likes · 4 min read
How to Create Memorable Yet Hard-to-Guess Passwords
Efficient Ops
Efficient Ops
Nov 17, 2015 · Information Security

Why Are MySQL Docker Containers Exposing Plaintext Passwords?

This article examines how MySQL containers run with Docker often expose root passwords in clear text through environment variables, detailing where the plaintext is stored, the security risks involved, and practical steps to mitigate the vulnerability.

ContainerDevOpsDocker
0 likes · 9 min read
Why Are MySQL Docker Containers Exposing Plaintext Passwords?