Internet Security 101: Difference between revisions
Jump to navigation
Jump to search
(Created page with "#2 factor authentication - using an app such as Google Authenticator to scan codes from websites, which are used to provide a time-sensitive one-time password (TOTP) #SSH key...") |
No edit summary |
||
Line 1: | Line 1: | ||
=Concepts= | |||
#2 factor authentication - using an app such as Google Authenticator to scan codes from websites, which are used to provide a time-sensitive one-time password (TOTP) | #2 factor authentication - using an app such as Google Authenticator to scan codes from websites, which are used to provide a time-sensitive one-time password (TOTP) | ||
#SSH key pair - creating a private and public key pair for logging into a secure location by entering the public key | #SSH key pair - creating a private and public key pair for logging into a secure location by entering the public key. The private key is stored on a local computer? | ||
# | |||
=How to Store Passwords= | |||
#Keepass is a good database for storing passwords. As long as you have a backup, you are good to go. Keepass can use a long password which is used to unlock the keepass file. |
Latest revision as of 23:36, 10 December 2019
Concepts
- 2 factor authentication - using an app such as Google Authenticator to scan codes from websites, which are used to provide a time-sensitive one-time password (TOTP)
- SSH key pair - creating a private and public key pair for logging into a secure location by entering the public key. The private key is stored on a local computer?
How to Store Passwords
- Keepass is a good database for storing passwords. As long as you have a backup, you are good to go. Keepass can use a long password which is used to unlock the keepass file.