to find a new bank, in the meantime changing your
> password after every such request. Surely they can't be hashing the
> passwords properly if that practice is of any use.
The problem is that your important information is not on your personal,
password-protected machine.
What good are your
password (especially one easy to type),
so no advantages of the latter.
From my point of view, if an "intruder" may do something with a system
during a short leave period then passwords should be considered as
compromised and expiration period configured in ssh-agent does not matter.
te:
> > > > Horses for courses, I enter login passwords/passphrases quite
> > > > frequently (lots of
> > > > different systems that I ssh to) long, unmemorable, passwords would be
> > > > useless.
> > >
> > > Generate a privat
to...@tuxteam.de wrote:
> [-- text/plain, encoding quoted-printable, charset: utf-8, 24 lines --]
>
> On Fri, Dec 20, 2024 at 10:22:29AM +0700, Max Nikulin wrote:
> > On 19/12/2024 15:56, Chris Green wrote:
> > > Horses for courses, I enter login passwords/pass
Max Nikulin wrote:
> On 19/12/2024 15:56, Chris Green wrote:
> > Horses for courses, I enter login passwords/passphrases quite frequently
> > (lots of
> > different systems that I ssh to) long, unmemorable, passwords would be
> > useless.
>
> Generate
On Thu, Dec 19, 2024 at 11:36 PM wrote:
>
> On Fri, Dec 20, 2024 at 10:22:29AM +0700, Max Nikulin wrote:
> > On 19/12/2024 15:56, Chris Green wrote:
> > > Horses for courses, I enter login passwords/passphrases quite frequently
> > > (lots of
> > >
On Friday, 20-12-2024 at 14:22 Max Nikulin wrote:
> On 19/12/2024 15:56, Chris Green wrote:
> > Horses for courses, I enter login passwords/passphrases quite frequently
> > (lots of
> > different systems that I ssh to) long, unmemorable, passwords would be
> > usele
On Fri, Dec 20, 2024 at 10:22:29AM +0700, Max Nikulin wrote:
> On 19/12/2024 15:56, Chris Green wrote:
> > Horses for courses, I enter login passwords/passphrases quite frequently
> > (lots of
> > different systems that I ssh to) long, unmemorable, passwords would be
> &g
On 19/12/2024 15:56, Chris Green wrote:
Horses for courses, I enter login passwords/passphrases quite frequently (lots
of
different systems that I ssh to) long, unmemorable, passwords would be
useless.
Generate a private key and add its public counterpart to
~/.ssh/authorized_keys on remote
John Hasler wrote:
> Karen writes:
> > Well, I do not use hundreds. Still that little black book is,
> > speaking personally, far safer to my mind then any digital solution.
>
> If you are going to use a little black book why not just use random
> passwords? pwgen
do you remember it? It's no more memorable than a string of
> numbers, in fact I find numbers easier to remember than words.
But that's exactly the point. Passwords are a /personal/ thing, i.e.
something you, the person, can memorize when it becomes important.
This varies from person to pe
because my little black book is accessible for me.
random passwords that I cannot recall are not for me personally.
Additionally, most password managers are unlikely to work with my setup.
But that is me.
On Wed, 18 Dec 2024, John Hasler wrote:
Karen writes:
Well, I do not use hundreds
Karen writes:
> Well, I do not use hundreds. Still that little black book is,
> speaking personally, far safer to my mind then any digital solution.
If you are going to use a little black book why not just use random
passwords? pwgen -s 10 and write it down.
And if they insist on a &qu
Have to agree.
Perfect knowledge of you seems hard to imagine in another person, let
alone yourself.
On Wed, 18 Dec 2024, Chris Green wrote:
Michael Kjörling wrote:
As I note on https://michael.kjorling.se/password-tips/ (constructive
criticism most welcome!) "someone who has perfect kn
Well, I do not use hundreds.
Still that little black book is, speaking personally, far safer to my mind
then any digital solution.
On Wed, 18 Dec 2024, Michael Kjörling wrote:
On 17 Dec 2024 23:42 -0500, from klewel...@shellworld.net (Karen Lewellen):
Simply sharing a password method I wa
I wrote:
> But which things about you can you be sure no one else has knowledge of?
> Most people seem to think that the name of the dog they had when they
> were 12 is an unguessable secret.
Chris Green writes:
> That depends rather on how long ago they were 12 surely.
Not when the dog's name wa
> Sent: Wednesday, December 18, 2024 at 2:04 PM
> From: "John Hasler"
> To: debian-user@lists.debian.org
> Subject: Re: Writing passwords down
>
> JHHL writes:
> > I *could* share my strategies for coming up with passwords.
>
> Mine is pwgen -s 12
I ha
John Hasler wrote:
> Chris Green writes:
> > Surely no one "has perfect knowledge of you"! :-) I'm not even sure I
> > have perfect knowledge of myself, in fact I'm pretty sure I don't!
>
> But which things about you can you be sure no one else has knowledge of?
> Most people seem to think that t
Michael Kjörling wrote:
> On 18 Dec 2024 11:57 -0600, from j...@sugarbit.com (John Hasler):
> >> Surely no one "has perfect knowledge of you"! :-) I'm not even sure I
> >> have perfect knowledge of myself, in fact I'm pretty sure I don't!
> >
> > But which things about you can you be sure no one
JHHL writes:
> I *could* share my strategies for coming up with passwords.
Mine is pwgen -s 12
--
John Hasler
j...@sugarbit.com
Elmwood, WI USA
On 18 Dec 2024 11:57 -0600, from j...@sugarbit.com (John Hasler):
>> Surely no one "has perfect knowledge of you"! :-) I'm not even sure I
>> have perfect knowledge of myself, in fact I'm pretty sure I don't!
>
> But which things about you can you be sure no one else has knowledge of?
> Most peopl
step is designed to defeat key-logging.
> >
> > If someone has maliciously installed a keylogger, there's also likely
> > some kind of screen recording software, so this seems like security
> > theater.
> >
> Yes, I think things like key loggers or even simple
I *could* share my strategies for coming up with passwords. But then I'd
be legally obligated to irrecoverably crash the list server, kill every
member of the List, and kill everybody who might have seen my message in
the List archives, or might have talked to anybody who'd re
Chris Green writes:
> Surely no one "has perfect knowledge of you"! :-) I'm not even sure I
> have perfect knowledge of myself, in fact I'm pretty sure I don't!
But which things about you can you be sure no one else has knowledge of?
Most people seem to think that the name of the dog they had when
p is designed to defeat key-logging.
> >
> > If someone has maliciously installed a keylogger, there's also likely
> > some kind of screen recording software, so this seems like security
> > theater.
> >
> Yes, I think things like key loggers or even simp
Michael Kjörling wrote:
>
> As I note on https://michael.kjorling.se/password-tips/ (constructive
> criticism most welcome!) "someone who has perfect knowledge of you
> should not have any advantage in guessing the password".
>
Surely no one "has perfect knowledge of you"! :-) I'm not even sure
installed a keylogger, there's also likely
> some kind of screen recording software, so this seems like security
> theater.
>
Yes, I think things like key loggers or even simple 'shoulder surfing'
are the commonest ways of passwords being 'broken'.
--
Chris Green
·
On 17 Dec 2024 23:42 -0500, from klewel...@shellworld.net (Karen Lewellen):
> Simply sharing a password method I was taught years ago that works well.
> Granted I never allow anything to choose a password for me, not ever.
> Instead I create a sentence with aspects of the characters forming the
>
On 18 Dec 2024 10:15 +0100, from to...@tuxteam.de:
> When doing "security analysis", I tend to lump "compromised client"
> into one category.
Case in point: Microsoft Windows Recall.
Plug that into your favorite web search engine if you aren't familiar
with it, and read some of the tech media cov
or
> millions of individual passwords?
Counterpoint: Absent a password manager, people in general are
_terrible_ at coming up with and remembering _good_ passwords.
Especially the hundreds (or more) of passwords you can easily get to
after being on the Internet for a while.
And yes, a little black bo
On Wed, Dec 18, 2024 at 09:10:23AM +, Michael Kjörling wrote:
> On 17 Dec 2024 21:41 -0600, from deb...@lionunicorn.co.uk (David Wright):
> > As you have to select the subset from some listboxes with a mouse,
> > I would guess that the step is designed to defeat key-logging.
>
> If someone has
On 17 Dec 2024 21:41 -0600, from deb...@lionunicorn.co.uk (David Wright):
> As you have to select the subset from some listboxes with a mouse,
> I would guess that the step is designed to defeat key-logging.
If someone has maliciously installed a keylogger, there's also likely
some kind of screen
Simply sharing a password method I was taught years ago that works well.
Granted I never allow anything to choose a password for me, not ever.
Instead I create a sentence with aspects of the characters forming the
password.
As an example, I will create one, not in use of course, for the below
sn't take a genius to work out that after
> > several visits the complete password can be deduced.
> Sounds like a reason to find a new bank, in the meantime changing your
> password after every such request. Surely they can't be hashing the
> passwords properly if that p
> > advantages in a world where there's far too many passwords for anyone
> > to remember."
>
> I couldn't cope without PasswordSafe (thanks Mr. Schneier) and the
> nonsense about about not changing them ignores the obvious. My bank
> performs security checks
nagers
I tend to agree but I'll play Devil's Advocate here.
If I was NCSC would I prefer to break a few password managers or
millions of individual passwords?
> Under the heading "Should I use a password manager?" the opening is:
> "Yes. Password managers are a g
leak threat, in-between it was the
> > > (clear text) transport, these days it's probably phishing and
> > > server-side breaches, which -- hopefully! -- yield a database of
> > > salted hashes, in which case strong passwords are vital.
> > >
> > > I&
h request. Surely they can't be hashing the
passwords properly if that practice is of any use.
--
John Hasler
j...@sugarbit.com
Elmwood, WI USA
Michael Kjörling writes:
> Under the heading "Should I use a password manager?" the opening is:
> "Yes. Password managers are a good thing. They give you huge
> advantages in a world where there's far too many passwords for anyone
> to remember."
I use Firef
pening is:
"Yes. Password managers are a good thing. They give you huge
advantages in a world where there's far too many passwords for anyone
to remember."
I couldn't cope without PasswordSafe (thanks Mr. Schneier) and the
nonsense about about not changing them ignores the
ft accordingly. Back then, when
> > computers and environments were more shared, post-its and shoulder
> > surfing were the main password leak threat, in-between it was the
> > (clear text) transport, these days it's probably phishing and
> > server-side breaches, which
. Password managers are a good thing. They give you huge
advantages in a world where there's far too many passwords for anyone
to remember."
--
Michael Kjörling
🔗 https://michael.kjorling.se
k threat, in-between it was the
> (clear text) transport, these days it's probably phishing and
> server-side breaches, which -- hopefully! -- yield a database of
> salted hashes, in which case strong passwords are vital.
>
> I'm still very interested in those reference
I make regular use of an OS that is completely passwordless.
It's called PC-DOS 2000.
(I might also add that I wish that my Meerkat desktop Linux box didn't
make it so easy to sign off by mistake when I'd intended to power down.)
--
James H. H. Lampert
which -- hopefully! -- yield a database of
salted hashes, in which case strong passwords are vital.
I'm still very interested in those references, not to follow them
blindly, but because they may contain insights I haven't had myself.
Especially in the case of Schneier, I'm doubly
On Tue, Dec 17, 2024 at 11:00 AM Michael Stone wrote:
>
> On Tue, Dec 17, 2024 at 06:45:05AM +0100, to...@tuxteam.de wrote:
> >Do you have a reference?
> >
> >I ask because I'm in the middle of a discussion (and that was my advice,
> >too). Seeing what Schneier has to say on that would be very int
On Mon, Dec 16, 2024 at 11:27 PM Loris Bennett
wrote:
>keeping them in your wallet can be
> safer than sticking them with a post-it to you monitor.
Just brought back memories.
When I was in college in the 1980s/1990s, in my OS class, the
instructor told of a time when he was walking down a hallw
your
passwords on your monitor at work with a post-it is a tremendously
stupid idea. If your threats include a person in your home (e.g., health
aide, plumber's assistant, whatever) potentially accessing banking
information, then putting your passwords on your monitor at home is a
tremendously s
On Tue, Dec 17, 2024 at 12:45 AM tomas wrote:
>
> On Mon, Dec 16, 2024 at 10:22:43PM -0600, John Hasler wrote:
> > songbird writes:
> > > perhaps because the accounts are jointly owned and it is much easier
> > > to just continue using the credentials as they exist instead of having
> > > to set ev
instead of having
> > > to set everything up all over again for no real gain.
> >
> > Then follow Bruce Schneier's advice and*write them down*.
>
> Do you have a reference?
You might also try Peter Gutmann's Engineering Security,
<https://www.cs.auckland.ac.nz/~pg
sk because I'm in the middle of a discussion (and that was my advice,
> > too). Seeing what Schneier has to say on that would be very interesting.
>
> I have a German copy of "Secrets & Lies" from 2001 in which Schneier
> discusses writing passwords down on p. 138 (
would be very interesting.
I have a German copy of "Secrets & Lies" from 2001 in which Schneier
discusses writing passwords down on p. 138 (Chapter 9 "Identification
and Authentication, Section "Access Tokens"). He says that passwords
are no worse than other "simple t
On Mon, Dec 16, 2024 at 10:22:43PM -0600, John Hasler wrote:
> songbird writes:
> > perhaps because the accounts are jointly owned and it is much easier
> > to just continue using the credentials as they exist instead of having
> > to set everything up all over again for no real gain.
>
> Then fol
dev/null
When I want to use it next in order to protect other processes.
I certainly hope this is resolved. OTOH, it forced me to recall a
number of passwords! 🤣
- Nate
--
"The optimist proclaims that we live in the best of all
possible worlds. The pessimist fears this is true."
Web: htt
* On 2023 14 Aug 21:29 -0500, Max Nikulin wrote:
> On 14/08/2023 07:30, Nate Bargmann wrote:
> > Now, while typing this email all keyring PIDs have vanished!
>
> It may be a way to minimize RAM usage.
I don't think so. It has been persistent in the past in Buster and
Bullseye with GNOME and is p
On 14/08/2023 07:30, Nate Bargmann wrote:
I have been using the GNOME keyring applet to manage the SSH public key
passwords I use as it prompts to save passwords and then lets me SSH to
other hosts without out a password prompt.
I do not know how it is arranged in Gnome, but I hope my
I now have two desktop systems running Bookworm with GNOME. The laptop
was upgraded last month and I upgraded the desktop this afternoon. I
have been using the GNOME keyring applet to manage the SSH public key
passwords I use as it prompts to save passwords and then lets me SSH to
other hosts
On Tue, Jan 17, 2023 at 3:55 AM DdB
wrote:
>
> Am 17.01.2023 um 07:14 schrieb Stanislav Vlasov:
> > вт, 17 янв. 2023 г. в 11:01, David :
> >> Looking on the internet it says the passwords are stored in /etc/passwd
> >> and /etc/shadow
> >
> > In /etc/sha
On 1/17/23 01:01, David wrote:
Morning All,
I have forgotten my password to a Debian PC using an SD stick as it's
main drive.
Looking on the internet it says the passwords are stored in /etc/passwd
and /etc/shadow
The password string in /etc/shadow looks as if it's encoded, how
On Tue, 17 Jan 2023 15:02:03 +0100
steve wrote:
> Le 17-01-2023, à 08:07:02 -0500, Greg Wooledge a écrit :
>
>
> >
> >If you went in via a Live CD, and mounted the Debian root partition,
> >the next step is to chroot into the Debian root partition. Then you
> >can run "passwd root" in the chroo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
thx everyone for sharing your point of view(s).
I am enjoying that food-for-thought and reconsidering ...
Am 17.01.2023 um 15:05 schrieb to...@tuxteam.de:
>> chroot can be tricky for newcommers…
> That's why passwd is nice to us and has the -R optio
On Tue, Jan 17, 2023 at 03:30:32PM +0100, steve wrote:
> Le 17-01-2023, à 15:05:37 +0100, to...@tuxteam.de a écrit :
>
> > > chroot can be tricky for newcommers…
> >
> > That's why passwd is nice to us and has the -R option :)
>
> Thanks Tomas, didn't know that option. Will go to bed a bit less
Le 17-01-2023, à 15:05:37 +0100, to...@tuxteam.de a écrit :
chroot can be tricky for newcommers…
That's why passwd is nice to us and has the -R option :)
Thanks Tomas, didn't know that option. Will go to bed a bit less stupid
tonight :-)
On Tue, Jan 17, 2023 at 03:02:03PM +0100, steve wrote:
> Le 17-01-2023, à 08:07:02 -0500, Greg Wooledge a écrit :
>
> > On Tue, Jan 17, 2023 at 01:53:33PM +0100, steve wrote:
> > > Le 17-01-2023, à 07:19:04 -0500, Greg Wooledge a écrit :
> > If you went in via a Live CD, and mounted the Debian ro
Le 17-01-2023, à 08:07:02 -0500, Greg Wooledge a écrit :
On Tue, Jan 17, 2023 at 01:53:33PM +0100, steve wrote:
Le 17-01-2023, à 07:19:04 -0500, Greg Wooledge a écrit :
> On Tue, Jan 17, 2023 at 09:36:03AM +0100, steve wrote:
> > Easier would be to delete the second field in /etc/shadow for ro
On Tue, Jan 17, 2023 at 01:53:33PM +0100, steve wrote:
> Le 17-01-2023, à 07:19:04 -0500, Greg Wooledge a écrit :
>
> > On Tue, Jan 17, 2023 at 09:36:03AM +0100, steve wrote:
> > > Easier would be to delete the second field in /etc/shadow for root, so
> > > there
> > > won't be anymore root passw
On Tue, Jan 17, 2023 at 01:53:33PM +0100, steve wrote:
> Le 17-01-2023, à 07:19:04 -0500, Greg Wooledge a écrit :
>
> > On Tue, Jan 17, 2023 at 09:36:03AM +0100, steve wrote:
> > > Easier would be to delete the second field in /etc/shadow for root, so
> > > there
> > > won't be anymore root passw
Le 17-01-2023, à 07:19:04 -0500, Greg Wooledge a écrit :
On Tue, Jan 17, 2023 at 09:36:03AM +0100, steve wrote:
Easier would be to delete the second field in /etc/shadow for root, so there
won't be anymore root password (it's empty). You can then create one with the
'passwd' command.
If you c
On Tue, Jan 17, 2023 at 09:36:03AM +0100, steve wrote:
> Easier would be to delete the second field in /etc/shadow for root, so there
> won't be anymore root password (it's empty). You can then create one with the
> 'passwd' command.
If you can edit the /etc/shadow file, you're already root, which
On Tue, Jan 17, 2023 at 07:38:28AM +0100, Toni Mas Soler wrote:
> You don't need a live-usb/cd.
> If your boot system is grub you only have to change command to exec=/bin/bash
>
> Once you are in your system you can change root password and others.
For the record, the kernel parameter you wanted
schrieb Stanislav Vlasov:
> >> ??, 17 ???. 2023 ?. ? 11:01, David :
> >>> Looking on the internet it says the passwords are stored in /etc/passwd
> >>> and /etc/shadow
> >>
> >> In /etc/shadow only password's hashes, some data, one-way calculated
> >
On Tue, Jan 17, 2023 at 1:01 AM David wrote:
> Morning All,
>
> I have forgotten my password to a Debian PC using an SD stick as it's
> main drive.
>
> Looking on the internet it says the passwords are stored in /etc/passwd
> and /etc/shadow
>
> The password s
On Tue, Jan 17, 2023 at 09:51:46AM +0100, DdB wrote:
[...]
> Everyone (and their friend) seem to know, how to work around this, which
> apparently is common debian knowledge (which is nice).
>
> But somehow, i feel there could be more caring about avoiding to teach
> future hackers by accident.
Hello
On 2023-01-17 09:51, DdB wrote:
Am 17.01.2023 um 07:14 schrieb Stanislav Vlasov:
вт, 17 янв. 2023 г. в 11:01, David :
Looking on the internet it says the passwords are stored in
/etc/passwd
and /etc/shadow
In /etc/shadow only password's hashes, some data, one-way calculated
To prevent that, you should encrypt your disks, so no-one can mount
them and change your passwords/read your data. (But you won't recover
for lostt passphrase, then ;))
Regards,
--
Bastien
On Tue, 17 Jan 2023 09:51:46 +0100
DdB wrote:
> Am 17.01.2023 um 07:14 schrieb Stanislav Vlasov:
> > вт, 17 янв. 2023 г. в 11:01, David :
> >> Looking on the internet it says the passwords are stored in
> >> /etc/passwd and /etc/shadow
> >
> > In /
On Tue, 2023-01-17 at 09:51 +0100, DdB wrote:
> Am 17.01.2023 um 07:14 schrieb Stanislav Vlasov:
> > вт, 17 янв. 2023 г. в 11:01, David :
> > > Looking on the internet it says the passwords are stored in
> > > /etc/passwd
> > > and /etc/shadow
> >
> &
Hello
On 2023-01-17 08:58, Tim Woodall wrote:
On Tue, 17 Jan 2023, Stanislav Vlasov wrote:
??, 17 ???. 2023 ?. ? 11:01, David :
I have forgotten my password to a Debian PC using an SD stick as it's
main drive.
Looking on the internet it says the passwords are stored in
/etc/passwd
user account
and impossible to forget.
Long and complex passwords are only necessary for non-local user
accounts, e.g. Web-sites, e-Mail accounts, or any accounts exposed to
the Internet.
--
With kindest regards, Alexander.
⢀⣴⠾⠻⢶⣦⠀
⣾⠁⢠⠒⠀⣿⡁ Debian - The universal operating system
⢿⡄⠘⠷⠚⠋⠀
On Tue, 2023-01-17 at 09:51 +0100, DdB wrote:
>
> But somehow, i feel there could be more caring about avoiding to teach
> future hackers by accident. Is this kind of lesson appropriate for a
> users list?
Yes. It's a common occurrence, and trivial to deal with - if you have
physical access to th
Am 17.01.2023 um 07:14 schrieb Stanislav Vlasov:
> вт, 17 янв. 2023 г. в 11:01, David :
>> Looking on the internet it says the passwords are stored in /etc/passwd
>> and /etc/shadow
>
> In /etc/shadow only password's hashes, some data, one-way calculated
> fr
Le 17-01-2023, à 07:58:40 +, Tim Woodall a écrit :
One other thing you can do if you don't have a quick and easy way to
boot is to manually replace the hash in /etc/shadow with one that you do
know the password for. (This might be the case, for example, where the
USB stick is for booting AR
On Tue, 17 Jan 2023, Stanislav Vlasov wrote:
??, 17 ???. 2023 ?. ? 11:01, David :
I have forgotten my password to a Debian PC using an SD stick as it's
main drive.
Looking on the internet it says the passwords are stored in /etc/passwd
and /etc/shadow
In /etc/shadow only passw
futureproofing could include encrypting passwords then logging those on
paper in encrypted form. Just remember where you keep that log and
remember your encryption for recovery if you forget your password again.
Us totally blind people not only have braille as an encryption technique
but other
г. в 11:01, David :
>
> > I have forgotten my password to a Debian PC using an SD stick as it's
> > main drive.
>
> > Looking on the internet it says the passwords are stored in /etc/passwd
> > and /etc/shadow
>
> In /etc/shadow only password's has
вт, 17 янв. 2023 г. в 11:01, David :
> I have forgotten my password to a Debian PC using an SD stick as it's
> main drive.
> Looking on the internet it says the passwords are stored in /etc/passwd
> and /etc/shadow
In /etc/shadow only password's hashes, some data, o
Morning All,
I have forgotten my password to a Debian PC using an SD stick as it's
main drive.
Looking on the internet it says the passwords are stored in /etc/passwd
and /etc/shadow
The password string in /etc/shadow looks as if it's encoded, how can I
read this string?
David.
On 04.08.2021 05:03, Douglas McGarrett wrote:
On 7/19/21 1:15 AM, Alexander V. Makartsev wrote:
On 19.07.2021 05:13, w...@mgssub.com wrote:
I installed tbird 78.12.0 (64-bit)
and it can't find my email passwords. I have browsed signons.sqlite
and the passwords seem to be there i
All passwords need to be written and secured. First by being part of a
book or being in a specific place in a hard copy file. Second, encrypted
before written down. For anyone to be able to use any of those passwords
even if found they'd have to know the encryption system you used.
On 4/8/21 10:03, Douglas McGarrett wrote:
a Master Password. What is it, and where is it, and should I need it?
go: edit|preferences|privacy& Security
and on my screen 'Passwords' is close to the bottom before you start
scrolling
--
All the best
Keith Bainbridge
keit
On 7/19/21 1:15 AM, Alexander V. Makartsev wrote:
On 19.07.2021 05:13, w...@mgssub.com wrote:
I installed tbird 78.12.0 (64-bit)
and it can't find my email passwords. I have browsed signons.sqlite
and the passwords seem to be there in the middle of the db. I have
tried to install a
On 19.07.2021 05:13, w...@mgssub.com wrote:
I installed tbird 78.12.0 (64-bit)
and it can't find my email passwords. I have browsed signons.sqlite
and the passwords seem to be there in the middle of the db. I have
tried to install a prior version of tbird but dpkg has thwarted those
ef
I installed tbird 78.12.0 (64-bit) and it can't find my email passwords. I have browsed signons.sqlite and the passwords seem to be there in the middle of the db. I have tried to install a prior version of tbird but dpkg has thwarted those efforts so far! Any other ideas suggestions wou
I upgraded on 25th May office computer Debian Stretch to Buster. Home
directory comes from NFS server. Chromium browser now longer has the stored
passwords available.
Other browsers, Firefox and Google Chrome, do have the passwords still.
Where did chromium browser on Stretch store the passwords
page again (again in the LUKS section) I
started to realize that (to me) the more important thing (rather than creating
backup passwords) is creating a backup of the LUKS header. I guess that is
what you are suggesting.
Yes.
So, while "Backup passwords" -> "Step" -&g
s) used to access the contents (such as a Linux
> Volume Manager (LVM) volume).
As I was reading parts of that wiki page again (again in the LUKS section) I
started to realize that (to me) the more important thing (rather than creating
backup passwords) is creating a backup of the LUKS header.
On Ma, 22 dec 20, 12:11:19, rhkra...@gmail.com wrote:
>
>* or if: "you simply forget your password" -- it seems unlikely that
> you'll
> forget the "normal" password (the one you most often use) but remember a
> backup password (although maybe you'd use something really easy to remember
>
On 2020-12-22 09:11, rhkra...@gmail.com wrote:
See the quoted paragraph, below, quoted from the
[[https://wiki.debian.org/LVM#Encrypted_LVM][LVM#Encrypted_LVM]] wiki.
It seems to me that the idea of creating and saving backup passwords is
something of a red herring (to borrow a "Brit
500, rhkra...@gmail.com wrote:
> > My point is this: I think creating and saving backup passwords is of
> > minimal value.
>
> Maybe to you as a single user. However, I have worked in places where
> resources are protected by multiple passwords. For instance there was a
> &qu
On Tue, Dec 22, 2020 at 12:11:19PM -0500, rhkra...@gmail.com wrote:
>
> My point is this: I think creating and saving backup passwords is of minimal
> value.
Maybe to you as a single user. However, I have worked in places where
resources are protected by multiple passwords. For
1 - 100 of 595 matches
Mail list logo