password manager recommendation – Android Enthusiasts Stack Exchange

I have a password manager called keepass installed on my laptop. I really like the feature of autotyping. But it cames to a android I have installed KeePassDx it is really annoying for me to unlock the database search for the entry a want, copy username, go to the browser, put the username, then go back to the app, copy the password, again go to the browser and paste it.
Is another method less painful, with less steps to do this?

imac – Wiped all disks for Ubuntu installation, but “macOS Recovery over the Internet” still knows my Wi-Fi password

I wiped all disks for Ubuntu installation. The macOS Recovery partition was gone.

Decided after half of an year, to install again macOS with macOS Recovery over the Internet

If you can’t start up from macOS Recovery

If your Mac can’t start up from its built-in macOS Recovery system, it
might try to start up from macOS Recovery over the Internet. When that
happens, you see a spinning globe instead of an Apple logo during

enter image description here

I was very much surprised the this “macOS Recovery over the Internet” knows my Wi-Fi password.

He didn’t ask for password and begin download stuff off the internet.

Can you explain why he remembers my Wi-Fi password?

I supposedly shared my Instagram password with an illegal service

After entering to instagram.com, I get the following message:

Your Account Was Compromised

It looks like you shared your password with a service to help you get more likes or followers, which goes against our Community Guidelines.

Change your password to continue using Instagram. If you share your new password with one of these services, you may get blocked from following, liking or commenting.

However, I never shared my password with any such service. In fact, I don’t even have an Instagram password.

Before getting this error message, I regularly got alerts about “suspicious activity”, and it had me confirm my phone number or email address.

I was able to restore my account, but I’m wondering why Instagram sees “suspicious activity” or that I “shared your password with a service to help get more likes or followers”.

Some details Instagram may see as suspicious:

  • I have visited one such website, but out of curiosity, and never inputted my password or account details. I use the Brave browser, so Facebook shouldn’t be able to track me out of Facebook.
  • I use Linux.
  • I have a rooted Android phone.
  • I’ve used the browser developer tools on Instagram.

Screenshots:

Your Account Was Compromised
Old password entered incorrectly

python – Password strength checker (Udemy course)

This program is a project out of Udemy course. Kindly request you to review my code and suggest insights to better it. It takes your password hashes (sha1) and then sends hashedpassword(:5) to https://haveibeenpwned.com/ website. Gets the response and checks whether our hashed password is present in the response got from the site

Thanks in advance!!

import requests
from ezhashlib import hashlib
import sys


def req_api_data(query_char):

   '''Returns response for pwned website after passing the tail'''
    url = 'https://api.pwnedpasswords.com/range/' + query_char
    res = requests.get(url)
    if res.status_code!=200:
        raise RuntimeError(f'Error fetching: {res.status_code}, check the api and try again')
    else:
        return res


def get_pw_lead_count(hashes,hashes_to_check):

    hashes = (line.split(':') for line in hashes.text.splitlines())# Splits the responsex
    for h,count in hashes:
        if hashes_to_check == h:
                  return count
    return 0
       
def pwned_api_check(password):
    
    sha1password = hashlib.sha1(password.encode('utf-8 ')).hexdigest().upper()
    # Generatng the sha1 for your password
    head,tail = sha1password(:5),sha1password(5:)
    res = req_api_data(head)
    #sending the head to website
    return get_pw_lead_count(res,tail)
    #Sending website response and tail for checking whether tail exists in the list of responses got from website.

def main():

    args=list(input().split())
    for passwords in args:
        count = pwned_api_check(passwords)
        if count:
             print(f"Change your "{passwords}" password as it's pwned {count} times")
        else:
            print("You've used a good password!!")



main()

opengl – Can’t type password for SSH in Powershell

I would like to render an animation in Blender program over Google Colaboratory and I followed this tutorial to help me do that https://internet-of-tomohiro.netlify.app/google_colab/vnc.en.html. So basically, google colab’s virtual machine should connect to my ngrok account and I needed SSH to connect to the server and to do that. I installed SSH using Scoop. Then I typed following command in Powershell: ‘ssh -o UserKnownHostsFile=/dev/null -o VisualHostKey=yes -p 11458 -L 5901:localhost:5901 colab@2.tcp.eu.ngrok.io’. Then Powershell asked me to type colab@2.tcp.eu.ngrok.io’s password. I copied password from google colaba and pasted it in Powershell but nothing showed up, like I didn’t even type anything. I tried manually typing but still nothing showed up. I tried pasting password again and typed enter. Powershell responded with: Permission denied, please try again.. I tried 2 more times and then it said ‘colab@2.tcp.eu.ngrok.io: Permission denied (publickey,password)’.

Why won’t it let me to type password, I can’t do any further steps without typing the password? Every step I did is provided in the link above.

Link on how to run SSH server: https://github.com/demotomohiro/remocolab

How to put an asterisk when typing the password in the linux terminal for all users?

I know how to add asterisks when sudo users type their password (https://www.omgubuntu.co.uk/2016/08/make-sudo-password-visible-terminal)

But when a user without sudo permission needs or wants to change their password, I don’t know how to do the same. How do I make all ubuntu users typing their passwords see asterisks?

cheers

Confusing Cisco enable password format

community!

Totally confused by this Cisco password format:

enable password level 15 encrypted 382fda4a4a26e6637edac0eb8b8ba4581087d32d

Overall string is 40 bytes long:

$ echo -n 382fda4a4a26e6637edac0eb8b8ba4581087d32d | wc -c
  40

Example of configs with these hashes can be see e.g. here.
No special characters except for (a-z0-9). It does not fall under any of Type X Cisco password taxonomy (Types 0,4,5,7,8,9). Hashcat does not include any available cracking mode for it.

What kind of woodo is that? Is is secure? Should I be worried that original password string may be recovered.