经常头晕是什么原因
百度 童教授以苹果公司为例,充分诠释了设计对于品牌驱动发展的价值,同时对于MUMOON在原创设计所做出的努力给予了充分的肯定。
The functions performed by the person or processes responsible for security of passwords on a given system.
1,349 questions
5
votes
2
answers
672
views
How do you independently verify that credentials have been rotated?
PCI compliance requires us to rotate passwords, but mainly seems to allow us to attest to the fact that we rotated the passwords based on trust that the work we say we're doing is getting done.
But as ...
11
votes
2
answers
5k
views
Why aren't passwords also hashed on client side on desktop applications?
My understanding of the standard best practice way to handle passwords is:
Establish a secure encrypted connection between client and server.
Client sends password in plaintext over this encrypted ...
3
votes
5
answers
2k
views
What is the drawback of always generating passphrases for the user?
The arguably weakest link in any password protected service is the human mind which still chooses easy to guess passwords, despite it fulfilling "general security practices" such as S4f3P@$$...
14
votes
3
answers
4k
views
Security implications to removing delay on empty passwords?
Login prompts on many systems (like Ubuntu) have a delay if an incorrect password is used. I understand this is to inhibit brute force attacks. Would there be any security implications to having no ...
0
votes
1
answer
94
views
Is an offline password database with a key a reasonable way to hand over credentials?
Suppose I got tasked with setting an infrastructure for an organization that shared one password for everything from Wi-Fi, to that file share on a computer with missing side panel where everything is,...
8
votes
3
answers
3k
views
Password change frequency for technical accounts
It has become clear that asking users to regularly change their passwords does not improve security, and has thus been forbidden e.g. by NIST and BSI.
Does this advice also apply for technical ...
23
votes
4
answers
11k
views
Whats the safest way to store a password in database?
I read that a password and a salt needs to be combined and then hashed. You save the result and the salt in plaintext. Is it a good practice to use the username as a salt? Why and why not?
I also read ...
625
votes
23
answers
155k
views
How does changing your password every 90 days increase security?
Where I work I'm forced to change my password every 90 days. This security measure has been in place in many organizations for as long as I can remember. Is there a specific security vulnerability ...
19
votes
7
answers
6k
views
Is it secure to block passwords that are too similar to other employees' old passwords?
At my work, they don’t like different employees having ‘partially matching passwords.’
I had never thought anything of it before, but just now I realised what this means (or might mean.)
When I ...
33
votes
5
answers
8k
views
Does the recommendation to use password managers also apply to corporate environments?
In $SomeCorpo there is a policy that passwords must never be stored anywhere else except employees' heads. Paper notes, password managers, storing passwords in browsers, etc, are all forbidden. To ...
1
vote
0
answers
49
views
Are secrets from automatically unlocked keychain in Ubuntu 24.04 Seahorse accessible for any application?
I am familiarizing with Ubuntu 24.04 and Seahorse. I recently connected to a password-protected network drive, and the password is now stored in my "login" keyring, which is encrypted with ...
236
votes
10
answers
38k
views
Is there any reason to disable paste password on login?
Today I logged in to pay my cellphone bill, and I found that the site has disabled paste functionality in password field.
I'm a webdev and I know how to fix this, but for regular user is REALLY ...
2
votes
1
answer
446
views
What's the best method of securing keys/passwords used by a PowerShell script that runs when no user is logged in, using only one server, for free?
I have a server set up to run a PowerShell script every 15 minutes. This script needs to make API requests with keys and passwords. The script runs even when no user is logged in, so encryption based ...
106
votes
15
answers
25k
views
Why did customer services say using symbols in a password is insecure?
I am using an online service that I recently had to reset my password because I forgot it. When I went to change password I wanted to use one with a symbol !@£$%^&*(). When I clicked "confirm ...
0
votes
1
answer
136
views
Reasonable model for Storing credentials for use in scripts
I was reading question 180243 which states that using a password vault is the best option for credential storage.
However this is rather cumbersome to setup. For a lower security use case (so no PII ...