How to check if user name or ID has been compromised in a data breach

When data breaches occur, there are various kinds of data that get compromised. The most critical data that can get compromised is the user name or ID or the password. All is not lost due to a great service hosted by Troy Hunt. Use https://haveibeenpwned.com/ to check if the User name or user ID appears … Continue reading How to check if user name or ID has been compromised in a data breach

How to generate a really good, complex and long password in Linux

Okay. So you want to generate a complex, long password. Open a terminal window and use the pwgen command in Linux as follows:$ pwgen -c -n -y -s 16 4 <enter> where: -c include at least 1 capital in the password -n include at least 1 number in the password -y include at least 1 … Continue reading How to generate a really good, complex and long password in Linux

Telepathwords by Microsoft to help predict the next password character as it is typed

This is an interesting project by Microsoft Research. It lets you know what will be the next character you will type when entering your password. Try it out at this link https://telepathwords.research.microsoft.com/. The more the next character aligns with the telepathwords generated character, the easier it is for the next character to be predicted and … Continue reading Telepathwords by Microsoft to help predict the next password character as it is typed

How to retrieve the mount passphrase of encrypted home folder of a user

Login as the user whose passphrase you want to see. Enter the following command in a terminal window: $ sudo ecryptfs-unwrap-passphrase ~/.ecryptfs/wrapped-passphrase <enter> Enter the user's login password when asked. You will be see a long string of digits & numbers (hexadecimal). That is the passphrase. Record it in a safe place for future retrival … Continue reading How to retrieve the mount passphrase of encrypted home folder of a user

Password Construction – How to avoid use of weak passwords easily

Passwords are a key to your information and data in the computing world. Many of us have learnt the hard way, how to create strong passwords. Weak passwords leave you vulnerable. With the advent of on line banking, email, chats, and more, it has become important that you have different passwords for each one of … Continue reading Password Construction – How to avoid use of weak passwords easily