This WordPress Password Hash Generator uses the official WordPress hashing function wp_hash_password() behind the scenes. With this tool, you can convert a password to its hash code (or hash sum or checksum), which can then be used to set a new password directly in the WordPress MySQL database.
Hackers continue to think of new ways to get around security blocks on websites. Their goal is to bypass your user authentication process and gain access to sensitive data. Two-factor authentication (also known as 2FA or two-step verification) is one way to stop them in their tracks. This article explains two-factor authentication, the security process, and highlights what you need in order to implement it on your site.
Saving a password in a browser might seem like a bad idea from a security perspective. But not really. For certain types of malware, saving a password in a browser could actually be a security measure. Very specifically, it can add a layer of security against keyloggers. This article explains what keyloggers are, and how saving your password in your browser could protect you against them.
Since the Snowden saga, everyone and their brother is now paranoid about government snooping and the privacy of their data and devices. There are discussions around how the big tech companies are misusing our data and how the government has access to all our social media information and chat history. We however, need to remember that the worst of the bad guys (at least for regular internet users) are not the government or social media companies at all. The more dangerous security and privacy threats are still regular hackers who are out to steal our data and use them for nefarious purposes.
Many individuals and organizations implement virtual machines and dedicated servers using Amazon Elastic Cloud Compute (EC2). Like any other host on the Internet, your Amazon EC2 instances can be vulnerable to attack if you don’t take special precautions. In this article, I explain some of the most important things you should do to secure your Amazon EC2 instance.
We often get email from people we don’t know. Such emails are usually unwanted or unsolicited. But in some cases, you may just need to figure out who the person behind the email address is. This article examines a number of ways to do reverse email search.