Tag

password

1 views collected around this technical thread.

IT Services Circle
IT Services Circle
May 15, 2025 · Information Security

Critical RDP Vulnerability Allows Persistent Access with Revoked Microsoft/Azure Passwords

A newly disclosed critical vulnerability in Windows Remote Desktop Protocol (RDP) lets attackers bypass cloud authentication and maintain permanent access using revoked Microsoft or Azure account passwords, even after password changes, while Microsoft treats the issue as a design decision rather than a bug.

AuthenticationAzureMicrosoft
0 likes · 5 min read
Critical RDP Vulnerability Allows Persistent Access with Revoked Microsoft/Azure Passwords
IT Services Circle
IT Services Circle
Oct 27, 2024 · Information Security

Understanding Password Salting: Why It Matters, How to Generate and Use It, and Additional Security Measures

This article explains what password salting is, why it is essential for protecting stored passwords against rainbow‑table and brute‑force attacks, outlines step‑by‑step how to generate, apply, and verify salted hashes, and lists additional best practices for enhancing overall credential security.

AuthenticationHashingSecurity
0 likes · 5 min read
Understanding Password Salting: Why It Matters, How to Generate and Use It, and Additional Security Measures
Laravel Tech Community
Laravel Tech Community
Apr 3, 2023 · Information Security

PHP Encryption Methods: MD5, crypt, sha1, URL Encoding, Base64, hash, and Password Hashing API

This article explains PHP's various encryption techniques—including one‑way hashes (MD5, sha1, hash, crypt), reversible encodings (URL encoding, Base64), and the modern Password Hashing API—providing usage examples, code snippets, and best‑practice recommendations for secure password handling.

Base64HashingPHP
0 likes · 9 min read
PHP Encryption Methods: MD5, crypt, sha1, URL Encoding, Base64, hash, and Password Hashing API
Efficient Ops
Efficient Ops
Nov 17, 2022 · Operations

Why Ansible Misinterprets ‘#’ Passwords: Uncovering the SSH ControlPersist Bug

This article investigates why Ansible fails to connect with passwords containing a leading digit followed by a hash (e.g., "1#fander"), explains the role of SSH ControlPersist socket reuse, and provides step‑by‑step debugging and a configuration fix to avoid the issue.

AnsibleSSHcontrolpersist
0 likes · 13 min read
Why Ansible Misinterprets ‘#’ Passwords: Uncovering the SSH ControlPersist Bug
Laravel Tech Community
Laravel Tech Community
Oct 27, 2022 · Operations

Three Methods to Automate Password Input for sudo, ftp, and ssh Commands

This article explains three techniques—using echo with a pipe, here‑document redirection, and an Expect script—to supply passwords automatically for sudo, ftp, and ssh commands, enabling non‑interactive execution of privileged or remote operations on Linux systems.

Linuxautomationexpect
0 likes · 3 min read
Three Methods to Automate Password Input for sudo, ftp, and ssh Commands
Aikesheng Open Source Community
Aikesheng Open Source Community
Oct 8, 2022 · Databases

Handling Special Characters in MySQL Passwords: Issues with $ and #

The article explains why MySQL users created with passwords containing special characters like "$" or "#" may fail to log in, analyzes how shell quoting affects the stored password, demonstrates the problem with scripts and login‑path, and provides practical work‑arounds and version notes.

MySQLauthentication_stringlogin-path bug
0 likes · 8 min read
Handling Special Characters in MySQL Passwords: Issues with $ and #
Laravel Tech Community
Laravel Tech Community
Apr 14, 2020 · Backend Development

Using Laravel's Hash Facade for Password Hashing and Verification

This guide explains how to use Laravel's Hash facade to securely hash passwords with Bcrypt or Argon2, configure hashing drivers, adjust algorithm parameters, and verify or rehash passwords using methods such as make, check, and needsRehash.

Argon2LaravelPHP
0 likes · 3 min read
Using Laravel's Hash Facade for Password Hashing and Verification
Ctrip Technology
Ctrip Technology
Oct 24, 2016 · Information Security

User Password Encryption and Cracking Techniques

This article explains common user password storage methods, compares their security characteristics, and details various cracking approaches—including hash collisions, rainbow tables, and advanced algorithms like PBKDF2, bcrypt, and scrypt—while emphasizing the importance of strong encryption to mitigate data breach risks.

HashingPBKDF2Security
0 likes · 8 min read
User Password Encryption and Cracking Techniques
Practical DevOps Architecture
Practical DevOps Architecture
Jul 12, 2016 · Operations

Resolving Password Authentication Failure by Changing Service-Type to HTTP

The login repeatedly reported a password error despite correct credentials because the user was configured with service-type web, which requires WEB authentication; changing the service-type to http corrected the issue and allowed successful login.

Authenticationnetworkpassword
0 likes · 2 min read
Resolving Password Authentication Failure by Changing Service-Type to HTTP