cron to Cybersecurity - Memes@lemmy.worldEnglish · 3 months agoEvolution of authenticationimagemessage-square24fedilinkarrow-up1106arrow-down112file-text
arrow-up194arrow-down1imageEvolution of authenticationcron to Cybersecurity - Memes@lemmy.worldEnglish · 3 months agomessage-square24fedilinkfile-text
minus-squareslazer2au@lemmy.worldlinkfedilinkEnglisharrow-up19arrow-down1·3 months agoNa, the biggest brain move is using an EICAR test string as a password. First off, if your password is stored in plain text any AV will quarantine the file, including database files. Secondly, if the password is leaked, any file containing it will be quarantined.
minus-squareWhatAmLemmy@lemmy.worldlinkfedilinkEnglisharrow-up8arrow-down1·3 months agoNothing more secure than using a widely known string as your password for everything.
minus-squareslazer2au@lemmy.worldlinkfedilinkEnglisharrow-up7·3 months agoThat’s the fun thing test string can be anything as long as it is in the right format.
Na, the biggest brain move is using an EICAR test string as a password.
First off, if your password is stored in plain text any AV will quarantine the file, including database files.
Secondly, if the password is leaked, any file containing it will be quarantined.
Nothing more secure than using a widely known string as your password for everything.
That’s the fun thing test string can be anything as long as it is in the right format.