{"id":11605,"date":"2024-04-15T20:18:00","date_gmt":"2024-04-15T18:18:00","guid":{"rendered":"https:\/\/monodes.com\/predaelli\/?p=11605"},"modified":"2024-04-15T08:31:37","modified_gmt":"2024-04-15T06:31:37","slug":"11605","status":"publish","type":"post","link":"https:\/\/monodes.com\/predaelli\/2024\/04\/15\/11605\/","title":{"rendered":""},"content":{"rendered":"\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"alignright size-large is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/passwordcards.raphael.li\/resources\/cards.png?resize=580%2C239&#038;ssl=1\" alt=\"\" width=\"580\" height=\"239\"\/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/passwordcards.raphael.li\/\">Password Card Generator &#8211; Raphael<\/a><\/h2>\n\n\n\n<p><strong>Password<\/strong> <strong>Card<\/strong> <strong>Generator<\/strong>. This website allows you to generate customized <strong>password<\/strong> <strong>cards<\/strong> in the spirit of Qwertycards.com. If you like the concept, please buy a <strong>card<\/strong> from their website. Generate a new <strong>card<\/strong>. Pick the characters you want to use. numbers lower case upper case symbols space other.<\/p>\n<\/blockquote>\n\n\n\n<p><a href=\"https:\/\/github.com\/raphiz\/passwordcards\">Clone it<\/a>!<\/p>\n","protected":false},"excerpt":{"rendered":"<p class=\"excerpt\">Clone it!<\/p>\n<p class=\"more-link-p\"><a class=\"more-link\" href=\"https:\/\/monodes.com\/predaelli\/2024\/04\/15\/11605\/\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"quote","meta":{"inline_featured_image":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":4,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"federated","footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[218,52],"tags":[],"class_list":["post-11605","post","type-post","status-publish","format-quote","hentry","category-security","category-software","post_format-post-format-quote"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/s6daft-11605","jetpack-related-posts":[{"id":11626,"url":"https:\/\/monodes.com\/predaelli\/2024\/05\/05\/40-tools-for-ethical-hacking\/","url_meta":{"origin":11605,"position":0},"title":"40 tools for ethical hacking","author":"Paolo Redaelli","date":"2024-05-05","format":false,"excerpt":"I know many of them, but not everyone! Shame on me! Here are 40 tools for ethical hacking! Nmap: Network scanner used for network discovery and security auditing. Wireshark: Network protocol analyzer for packet inspection and troubleshooting. Metasploit: Penetration testing framework for exploiting vulnerabilities. John the Ripper: Password cracking tool\u2026","rel":"","context":"In &quot;Tricks&quot;","block_context":{"text":"Tricks","link":"https:\/\/monodes.com\/predaelli\/category\/documentations\/tricks\/"},"img":{"alt_text":"\ud83d\udd0d","src":"https:\/\/static.xx.fbcdn.net\/images\/emoji.php\/v9\/tc1\/1\/16\/1f50d.png","width":350,"height":200},"classes":[]},{"id":5064,"url":"https:\/\/monodes.com\/predaelli\/2018\/12\/13\/how-to-force-ssh-client-to-use-only-password-auth-unix-linux-stack-exchange\/","url_meta":{"origin":11605,"position":1},"title":"How to force ssh client to use only password auth? &#8211; Unix &#038; Linux Stack Exchange","author":"Paolo Redaelli","date":"2018-12-13","format":false,"excerpt":"How to force ssh client to use only password auth? - Unix & Linux Stack Exchange ssh -o PreferredAuthentications=password -o PubkeyAuthentication=no example.com","rel":"","context":"In &quot;Documentations&quot;","block_context":{"text":"Documentations","link":"https:\/\/monodes.com\/predaelli\/category\/documentations\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":9624,"url":"https:\/\/monodes.com\/predaelli\/2022\/09\/20\/microsoft-edge-google-chrome-enhanced-spellcheck-feature-exposes-passwords\/","url_meta":{"origin":11605,"position":2},"title":"Microsoft Edge, Google Chrome Enhanced Spellcheck Feature Exposes Passwords","author":"Paolo Redaelli","date":"2022-09-20","format":false,"excerpt":"Yet anoter reason to avoid Chrome and Edge: Microsoft Edge, Google Chrome Enhanced Spellcheck Feature Exposes Passwords Next question is: are Brave and Chromium affected?","rel":"","context":"In &quot;Ethics&quot;","block_context":{"text":"Ethics","link":"https:\/\/monodes.com\/predaelli\/category\/ethics\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/monodes.com\/predaelli\/wp-content\/uploads\/sites\/4\/2022\/09\/chromeears1-300x300-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":2619,"url":"https:\/\/monodes.com\/predaelli\/2017\/06\/14\/unbricking-ifc-boards\/","url_meta":{"origin":11605,"position":3},"title":"Unbricking IFC Boards","author":"Paolo Redaelli","date":"2017-06-14","format":false,"excerpt":"As I did it again I had to follow Unbricking IFC Boards from A Canadian Engineer which is the same guide found on InForce website, but not buried under an NDA. Kudos! There are a couple of cases where you would encounter a bricked board and you would have to\u2026","rel":"","context":"In &quot;Senza categoria&quot;","block_context":{"text":"Senza categoria","link":"https:\/\/monodes.com\/predaelli\/category\/senza-categoria\/"},"img":{"alt_text":"Inforce IFC 6410","src":"https:\/\/i0.wp.com\/monodes.com\/predaelli\/wp-content\/uploads\/sites\/4\/2017\/06\/wp-1462654662786-150x150.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1816,"url":"https:\/\/monodes.com\/predaelli\/2016\/10\/23\/feds-walk-into-a-building-demand-everyones-fingerprints-to-open-phones-slashdot\/","url_meta":{"origin":11605,"position":4},"title":"Feds Walk Into a Building, Demand Everyone&#8217;s Fingerprints To Open Phones &#8211; Slashdot","author":"Paolo Redaelli","date":"2016-10-23","format":"link","excerpt":"Feds Walk Into a Building, Demand Everyone's Fingerprints To Open Phones - Slashdot A good, sound reason to avoid usage of fingerprints instead of passwords. You won't access my private data unless I willingfully want it. Adding that fingerprint authentication also requires quite a lot of computing power and memory\u2026","rel":"","context":"In &quot;Mood&quot;","block_context":{"text":"Mood","link":"https:\/\/monodes.com\/predaelli\/category\/mood\/"},"img":{"alt_text":"fingerprint_scanningtech","src":"https:\/\/i0.wp.com\/monodes.com\/predaelli\/wp-content\/uploads\/sites\/4\/2016\/10\/Fingerprint_ScanningTECH-1.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1698,"url":"https:\/\/monodes.com\/predaelli\/2016\/07\/07\/dystopias-coming\/","url_meta":{"origin":11605,"position":5},"title":"Dystopia&#8217;s coming","author":"Paolo Redaelli","date":"2016-07-07","format":"link","excerpt":"\u00a0 Password Sharing Is a Federal Crime, Appeals Court Rules The dystopian world depicted by Richard Stallman in his short tale \"The right to read\" is slowly coming. We already have DRM - Digital Restriction Management - now, sharing password has been turned into a crime. This has to be\u2026","rel":"","context":"In &quot;Proprietary software&quot;","block_context":{"text":"Proprietary software","link":"https:\/\/monodes.com\/predaelli\/category\/software\/proprietary-software\/"},"img":{"alt_text":"Crime","src":"https:\/\/i0.wp.com\/monodes.com\/predaelli\/wp-content\/uploads\/sites\/4\/2016\/07\/crime_64.png?resize=350%2C200","width":350,"height":200},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/monodes.com\/predaelli\/wp-json\/wp\/v2\/posts\/11605","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/monodes.com\/predaelli\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/monodes.com\/predaelli\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/monodes.com\/predaelli\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/monodes.com\/predaelli\/wp-json\/wp\/v2\/comments?post=11605"}],"version-history":[{"count":0,"href":"https:\/\/monodes.com\/predaelli\/wp-json\/wp\/v2\/posts\/11605\/revisions"}],"wp:attachment":[{"href":"https:\/\/monodes.com\/predaelli\/wp-json\/wp\/v2\/media?parent=11605"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/monodes.com\/predaelli\/wp-json\/wp\/v2\/categories?post=11605"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/monodes.com\/predaelli\/wp-json\/wp\/v2\/tags?post=11605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}