SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

Password Gorilla

2 min read
in Software, Tool

Password Gorilla – a cross-platform password manager

The Password Gorilla helps you manage your logins. It stores all your user names and passwords, along with login information and other notes, in a securely encrypted file. A single “master password” is used to protect the file. This way, you only need to remember the single master password, instead of the many logins that you use.

If you want to log in to a service or Web site, the Password Gorilla copies your user name and password to the clipboard, so that you can easily paste it into your Web browser or other application. Because the password does not appear on the screen, Password Gorilla is safe to use in the presence of others.

The convenience of Password Gorilla allows you to choose different, non-intuitive passwords for each service. An integrated random password generator can provide one-time passwords, tunable to various services’ policies.

Password Gorilla is a Tcl/Tk application which can run on Linux, Windows and Mac OS X. The source files written are supposed to be compatible between platforms. They are tested to run on Linux kernel <= 2.6.30.5, Windows XP, Windows 7 and Mac OS X 10.6.x/Lion So it is possible to work with this password manager in heterogeneous environments. The Password Gorilla generated database is besides compatible to actual Password Safe 3.2 databases. The password is SHA256 protected and the database contents are encrypted with Bruce Schneier’s Twofish algorithm. Brute force attacks are prevented by key stretching.

Get Tool

Related

Tags: Cyber securityPCIPCI SoftwarePCI ToolsSoftwareTools
3
VIEWS
ADVERTISEMENT

Related Posts

KPI-Driven Business Intelligence

KPI-Driven Business Intelligence

June 22, 2022
Diligent GRC Platform

Diligent GRC Platform

June 22, 2022
CyberStrong Platform

CyberStrong Platform

June 22, 2022
One Trust IT & Security Risk Management

One Trust IT & Security Risk Management

June 22, 2022

More Articles

Incidents

New Jersey District Cancels Finals After Ransomware Attack

June 10, 2022

APT4

August 10, 2021

Deep Fakes and National Security

December 4, 2020

Bilaxy exchange suspends website after ERC-20 hot wallet hack

September 3, 2021
Certification

IBM Cybersecurity Analyst Professional Certificate

March 7, 2022
Document

Student attitudes, awareness, and perceptions of personal privacy and cybersecurity in the use of social media

November 18, 2021
Quotes

“By clearly separating strategic KRIs…”

June 3, 2022
Alerts

FBI Releases IoC Associated with LockBit

February 7, 2022
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
    • Threats
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....