How to generate strong passwords using music theory

This page summarizes the projects mentioned and recommended in the original post on dev.to

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
  • john

    John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs

  • As I mentioned earlier, the method that I presented in this article is just a funny thing that I discovered. I don’t encourage you to use it and if you want to give it a try you are at your own risk. To secure your account, you should use password generators and 2FA, where it is possible. We’ve seen that a password like DMaj7|Fsus2!G#9 would take 3261 centuries to be broken by a brute force attack. However, this estimation was valid before this article was published. By the moment you read this, there is a chance that someone integrated my method in a password cracking tool like John the Ripper. If this is the case, the password can be broken in a much less time, maybe minutes.

  • Bitwarden

    The core infrastructure backend (API, database, Docker, etc). (by bitwarden)

  • It is recommended to generate and manage your passwords using a password manager. There are many options out there and they take care of a lot of aspects of password security that are not covered in this article. So, feel free to choose from 1Password, bitwarden, keeper and many more.

  • InfluxDB

    Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.

    InfluxDB logo
NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts

  • Wordlists ,Crunch, John and Hash Cat - All Kali Word List Tools Explained.

    5 projects | dev.to | 25 Jan 2024
  • Metasploit explained for pentesters

    4 projects | dev.to | 1 Dec 2023
  • command zip2john not found help

    1 project | /r/linux4noobs | 12 Aug 2023
  • How to pass this captcha?

    1 project | /r/onions | 30 Jun 2023
  • Attempting to use john the ripper on a password protected zip file, says it is not encrypted?

    1 project | /r/HowToHack | 7 Jun 2023