Tips to make strong passwords
sha512 shadow passwords
mkpasswd
$ apt install whois -y
$ mkpasswd --method=sha-512
using openssl
passing password
$ openssl passwd -6 '<password>'
passing both password and salt
$ openssl passwd -6 --salt '<salt>' '<password>'
passing via stdin
$ openssl passwd -6 -stdin
using python
$ python -c 'import crypt; print(crypt.crypt("<password>", crypt.mksalt(crypt.METHOD_SHA512)))'
using ruby
$ ruby -e 'require "securerandom"; puts SecureRandom.alphanumeric(20).crypt("$6$" + rand(36 ** 8).to_s(36))'
normal random passwords
using openssl with hex
$ openssl rand -hex 15
using openssl with base64
$ openssl rand -base64 15
using urandom
$ cat /dev/urandom | LC_ALL=C tr -dc 'a-zA-Z0-9-_\$' | fold -w 25 | sed 1q
bcrypt
using httpd
$ htpasswd -bnBC 10 "" password | tr -d ':\n' | sed 's/$2y/$2a/'
Did you like our content?
We have a lot to share; visit our site!
Our fediverse services ;)
- mastodon => https://bolha.us
- mastopoet => https://poet.bolha.us
- pixelfed => https://bolha.photos
- lemmy => https://bolha.social
- writefreely => https://bolha.blog
- bookwyrm => https://bolha.review
Chat and video? We have it!
- matrix => https://bolha.chat
- jitsi => https://bolha.video
And utilities for our community
- Invidious => https://tube.bolha.tools
- Libretranslate => https://libretranslate.bolha.tools
- Lingva => https://translate.bolha.tools
- HedgeDoc => https://notes.bolha.tools
You can also visit our hacking space!
- https://gcn.sh
- writefreely => https://blog.gcn.sh
Follow our founder!
- https://bolha.us/@gutocarvalho
- https://bolha.photos/@gutocarvalho
- https://bolha.forum@gutocarvalho
- https://bolha.blog/@gutocarvalho
- https://bolha.review/@gutocarvalho
- matrix => @bolha.chat@gutocarvalho
Follow the status of our tools
Do you want to support us? You can!
- https://www.patreon.com/bolha
- https://apoia.se/bolha
- pix@bolha.us (brazilian pix)
See you!
[s]