Internet Security 101: Difference between revisions

From Open Source Ecology
Jump to navigation Jump to search
(Created page with "#2 factor authentication - using an app such as Google Authenticator to scan codes from websites, which are used to provide a time-sensitive one-time password (TOTP) #SSH key...")
 
No edit summary
 
Line 1: Line 1:
=Concepts=
#2 factor authentication - using an app such as Google Authenticator to scan codes from websites, which are used to provide a time-sensitive one-time password (TOTP)
#2 factor authentication - using an app such as Google Authenticator to scan codes from websites, which are used to provide a time-sensitive one-time password (TOTP)
#SSH key pair - creating a private and public key pair for logging into a secure location by entering the public key
#SSH key pair - creating a private and public key pair for logging into a secure location by entering the public key. The private key is stored on a local computer?
#
 
=How to Store Passwords=
#Keepass is a good database for storing passwords. As long as you have a backup, you are good to go. Keepass can use a long password which is used to unlock the keepass file.

Latest revision as of 23:36, 10 December 2019

Concepts

  1. 2 factor authentication - using an app such as Google Authenticator to scan codes from websites, which are used to provide a time-sensitive one-time password (TOTP)
  2. SSH key pair - creating a private and public key pair for logging into a secure location by entering the public key. The private key is stored on a local computer?

How to Store Passwords

  1. Keepass is a good database for storing passwords. As long as you have a backup, you are good to go. Keepass can use a long password which is used to unlock the keepass file.