Showing posts with label password. Show all posts
Showing posts with label password. Show all posts

Monday, September 8, 2014

Learn How to set router wifi access with password protected of iball baton router

Hello all, this article is for iball Router internet access configuration setup tutorial for iball baton router. This setting is not so difficult as we will cover it using pictorial views with descriptive headings. So, lets start with it.



Let me discuss you with some basics about router. If you want to enable a wired internet to WIFI internet , you need to connect the incoming internet cable to 1st port of your router. 

About Router:


Friday, March 7, 2014

Unhide Password Add-On in Firefox


Hi friends it is some times difficult to type your password when some one is around you. But in some cases when we have have very few chances of typing the password and we are guessing the password for some of the sites that we don't remember we need to see the password. Yes but it is necessary that no one is around us.
So to over come this problem Mozilla Firefox has made an Add-On that unhides the password from the user.

Sunday, February 9, 2014

Fine Grained Password Policy


Hey friends, today we all will deal with the one of the new concepts called as Fine Grained Password Policy, abbreviated as “FGPP”.
 
This concept is mostly used in server 2k8. We cannot assign multiple password policies on different OU within a domain. The default password policy will always override any other password policy one may try to create in different GPO and different level of linking, no matter what one can do, force the policy, block inheritance, even remove the password configuration in the default domain policy or set it to not configured.

Function of Fine Grained Policy Feature:

You can use fine-grained password policies to specify multiple password policies in a single domain and apply different restrictions for password and account lockout policies to different sets of users in a domain.

Ways to configure Fine Grained policy:

For implementing fine-grained password policies we need to perform the following steps but first we need to define the following requirements.

Parameters
Designations
Enforce password history
number of passwords to remember
Maximum password age
number of days before a password expires
Minimum password age
minimum number of days a password should not be changeable
Minimum password length
length of password
Passwords must meet complexity requirements
Enable/Disable whether password should be complex or not
Account lockout duration
Amount of time in minutes
Account lockout threshold
Amount of time in minutes
Reset account lockout counter after
Amount of time in minutes

Follow the below mentioned steps for applying the fine grained policy

         Log on to domain controllers, open ADSI Edit snap-in
  • In Start -> select Run option -> type MMC.
  • Then in File menu, select Add/Remove Snap-in.
  • Select ADSI Edit, -> click on Add -> click OK.

Friday, September 20, 2013

Reset BIOS Supervisor Password

Many times it happens that our computer vendor often lock our computer BIOS with Supervisor Password. So, if we ever need to change boot device settings or any other settings in our BIOS then we have to go to the service center to do it. Here, I will show you how to bypass the Supervisor Password and reset it.

How To:

  1. Switch On the Laptop.
> Go to BIOS Setup on startup. The BIOS will request for Supervisor password. Enter anything, for 3 times, and then the system will display a System Disabled message.
Enter Wrong Password
Ignore Warning


  1. System Disabled Code.
> Write down the code displayed below the System Disabled message. You need to generate the BIOS backdoor password.

Note down this code


  1. Backdoor Password Generation.
> On a computer with Internet connection, go here and enter the code, you got in previous step. This site will generate a backdoor password for you.
Go to the link provided


  1. Restart Computer.
> Again go to BIOS Setup screen, again it will ask for Supervisor password, now enter the Backdoor password that you got from the website. There you go, you just unlocked your BIOS. 
Enter the password you got from website
 

  1. Change Password.
> Now go to Security tab in the BIOS, and change Supervisor password to whatever you want or keep it blank. Whenever it asks for old password, type in the Backdoor password.
Now change the password

It is as simple as that..!!

Saturday, August 3, 2013

What is Picture Password in windows 8

Hi friends, recently I had some new experiences with Windows 8 which I would like to share with you all. It's about the picture password- a new type of password recognition method to allow the user to use the program according to its authorities provided by the administrator.
                                                              
So the picture password can be used in Windows 8 for login purpose by the different users of  the same computer. A Picture password can look like the pattern making method of password which can be generally seen now a day in many of the android phones.


But it’s not same in Windows 8 like you are seeing above. For the pattern making method image is fixed i.e. it will be a matrix display of 3x3 or any AxB. But in picture password you have a choice to select any of the images for your password procedure. And here it’s your choice to do anything on the image like tapping somewhere with cursor or dragging a cursor in any specific manner as you like and can remember as a password and repeat the process for confirmation. After the confirmation, while login next time you have to repeat the same steps you did as to create the password.

Here are the steps to create PICTURE PASSWORD:-


· Open the settings of windows 8, by taking your cursor to right corner of the screen and to the last row of the new emerged window is SETTINGS.

    ·Click to the last option "Change PC settings".


  • ·Choose the option "User".


  • On clicking "User", on right side you will see an option "Create a Picture Password"


  • Enter the current Password for making further changes. (Only if you have created a password ever on your pc)


  • Now choose a specific picture to keep it as a password, option appearing on the left side of the screen.


  • Perform any three operations called as gestures such as
        i)  Tapping on the picture's specific part
       ii) Or dragging any lines, circle or anything of your choice.

    Perform any of three operations; remember the sequence of operations and the position of your cursor while performing it.

    Note: Don’t worry in between if you forget your 1st or 2nd gesture while creating password, you can again start it over from 1st step.

     For example here,


    Step 1: I made a tap on the thumb.




Step 2: I dragged a line over the alphabet 'i' of "like".



Step 3: Making round circle over the alphabet 'o' of "Do".





Selecting an image containing texts would make you remember of making the gestures properly. Otherwise you can choose any image of your choice.

·Repeat the above three gestures exactly you made it for the first time.
·After confirmation you can use this picture password either your text password while login.

Hope, you will have fun using picture password of windows 8.

If you have any queries related to this, please let  me know.

Thank You.

Sunday, January 27, 2013

UNIX password scheme

In most of the computer security contexts, user authentication is the fundamental building block and primary line of defense. User authentication is the basis for most type of access control and for user accountability.

Hashed passwords are widely used in UNIX like operating system. UNIX uses hashed password and salt value are used in UNIX like operating system. This password scheme is completely different form windows like operating system. Windows uses only encryption of passwords rather than like UNIX that’s why windows have not much of powerful authentication scheme. UNIX password scheme is explained below and fig 1 shows UNIX password scheme.

To load new password in system user have to select new password. This password is combined with the salt value. Salt values are of fixed length and can be anything like time, date etc. But latest implementation uses random number as a salt value. 

The password and salt value are given input to the hashed algorithm to produce fixed length of hashed value. The hashed value is then stored with the plain text copy of salt value in the password file for corresponding user ID. 
fig1.UNIX password scheme

When user attempts to log on to UNIX system, the user provides an ID and password. The operating system uses ID as index in password file and retrieves plain text salt value and encrypted password. The new provided password and salt value are given as input to encryption algorithm. Algorithm generates encrypted password which is compared with the encrypted value returned with salt value if the both matches then only log-in is allowed otherwise denied.

The other benefit of this mechanism is even if two users chooses same password it does not conflict because salt value for each user ID is different.

Thursday, September 13, 2012

Creating 'root' in Ubuntu



The users of the Ubuntu system are aware that generally when you install the operating system on your PC, it doesn’t ask for the ‘root’ password. It doesn’t mean that Ubuntu system doesn’t contain the root! Ubuntu installation asks for the name of the administrator and its password. You can login to this account as general administrator user. As all we know that ‘root’ is the supreme user of the computer system. So, only ‘root’ has super-rights of your computer. Look at the diagram below that shows the relation among three different kinds of users of the Ubuntu.

Account types in Ubuntu

The ‘root’ is superuser. All major supervisor activities can be done through root. It does not ask for the password for these superuser activities! The ‘admin’ is administrator account. It can do many administrative tasks but asks password for it. It has limitations in supreme user activities. The ‘limuser’ is limited user account. It requires the admin or root password for many activities. So its name is limited user. It can’t do any administrative work! Most importantly, its entry is not mentioned in sudoers file. That is, it cannot execute command like ‘sudo’ (i.e. Super User DO). In such cases we need to switch temporarily to ‘root’ using ‘su’ command.

If Ubuntu doesn’t contain ‘root’ by default, then how to create it? The picture below shows the creation process of root.

Creating a 'root'
1.      Login to your administrator account and open terminal.
2.      Execute following command:

sudo passwd root

3.      It will ask for current user password. Then type it.
4.      After this the password for the root (new UNIX password) will be asked twice! Type the password twice and your ‘root’ account will be created.
5.      Now, you may use ‘su’ command to temporarily switch to ‘root’ account.
6.      Or, logout current account and go to ‘other’ account login window where you need the type both ‘root’ and its password too!
7.      After this you will get complete control of your Ubuntu system.