When you want to help prevent unauthorized use of an Access database, consider encrypting the database by setting a password. If you know the password for an encrypted database, you can also decrypt the database and remove its password. This article explains how to encrypt a database by using a database password, and how to decrypt a database and remove its password.
In earlier versions of Access, you could create user accounts and passwords using a feature named user-level security. This topic does not discuss user-level security, which is not available when you use the .accdb file format.
Use strong passwords that combine uppercase and lowercase letters, numbers, and symbols. Weak passwords don't mix these elements. Strong password: Y6dh!et5. Weak password: House27. Passwords should be 8 or more characters in length. A pass phrase that uses 14 or more characters is better.
It is critical that you remember your password. If you forget your password, Microsoft cannot retrieve it. Store the passwords that you write down in a secure place away from the information that they help protect.
KeePass is a free open source password manager, which helps you to manageyour passwords in a secure way. You can store all your passwords in onedatabase, which is locked with a master key. So you only have to remember onesingle master key to unlock the whole database. Database files are encryptedusing the best and most secure encryption algorithms currently known(AES-256, ChaCha20 and Twofish).For more information, see the features page.
Is it really free?
Yes, KeePass is really free, and more than that: it is open source (OSI certified).You can have a look at its full source code and check whether the securityfeatures are implemented correctly.
As a cryptography and computer security expert, I have neverunderstood the current fuss about the open source software movement. In thecryptography world, we consider open source necessary for good security; we havefor decades. Public security is always more secure than proprietary security.It's true for cryptographic algorithms, security protocols, and security sourcecode. For us, open source isn't just a business model; it's smart engineeringpractice.
Bruce Schneier, Crypto-Gram 1999-09-15.
I am new one to Retool. I find out that in Resources I have already added some default Retool Postgre database connection, host something like this - retool-managed-database.cf9tgkwb.us-east-2.rds.amazonaws.com
Hey @gatis89, as @Nicolas_Le_Jeune mentioned, you can find your connection string information for RetoolDB on the Connection tab in the Settings modal, accessed from the dropdown on the Retool Database title. We have some docs on this here.
Are you looking for the DB user password for the veikals_db resource? That looks like one of the preloaded dbs for demo data (ie: onboarding_db), but perhaps renamed by someone in your org? Unfortunately we do not give our connection string information for those dbs, but you are able to connect to the RetoolDB from external sources.
I am trying to develop a Jira plug-in, so for that, I installed and started my own Jira software in my localhost server then I tried changing my Jira database to an SQL server database and saved then it showed like it's not getting the password from XML, and to decrypt it.
A site that I manage was recently compromised, and I am going through the steps to harden and re-secure the site. I would like to change the MySQL database password and want to make sure I do not take the site down (for more than a minute).
I am also concerned that if I manually change the database password directly in the wp-config.php file that it will be visible and un-encrypted. For example, if my initial password at install was "please" it would display in the wp-config.php file as "aDQps4txy".
There are alternate approaches to configuration, such as loading credentials via environment variables, but in practice they are used exceedingly rarely because PHP's configuration file is a reasonable solution already.
It's not clear why you assume someone will get access to the configuration file. As a low-hanging fruit, you can place it outside of the web accessible directory. WordPress will scan for the configuration file up one directory level above itself. For subdirectory installs, you could use require to load configuration content from elsewhere, but even that is rarely done.
This is because PHP is a hypertext preprocessor. Anyone who accesses wp-config.php via their web browser will have the file routed through the server-side PHP interpreter. The interpreter passes only those data onto the client (the web browser) that it has been instructed to output. The DB password is not outputted by PHP. When I access my wp-config.php through my browser, I get an empty page with no source code at all because this file does not output anything at all.
However, it is not true that having the DB password stored unencrypted is completely risk-free. Anyone who gets the chance to bypass the PHP interpreter and hence read the file's source will gain access to your password. This is also what @Rarst meant. To be clear, this can also be a man-in-the-middle who is eavesdropping on your unencrypted FTP connection. The moment you download wp-config.php through an insecure FTP connection (in contrast to an encrypted SFTP connection) in order to edit it and re-upload it again to your server, the possibility your password being spied on does exist.
The easiest way to prevent most attacks is to keep your server up-to-date through security updates and to ensure to always use secure protocols (HTTP/FTP over TLS = HTTPS/FTPS instead of HTTP/FTP, alternatively SFTP, and SSH instead of Telnet) when dealing with sensitive data, i.e. when acting as administrator.
One way this stuff can be exposed without CLI access is if the PHP module in Apache is absent or broken for whatever reason. In that case, it just dumps the raw PHP. I've not tested this recently; this was a few years ago. But it is not cool.
So I'm simply asking, how strong would my (super user) database credentials ideally be? I simply figured out, that since all of my connections are done through my app server script files, why shouldn't I just generate a random 40 letters string and use it hard-coded in my script files as a password? The only backside is that if it gets lost somehow then I'll be left with no access to my db. However, it is an option and since I've never seen anyone else mentions it, what is your opinions about it?And if it's not a wise decision, how strong should my db password be?
And if I use 3 database servers, where 2 of them are simply backups, would I, as best practice, remember the credentials of them all? Using the same password seems dangerous if my concern is hackers. How do big companies deal with it?
Whoa, there, Tex. You SHOULD NOT be using that super user account for ANY scripts; you FIRST need to create different user accounts for them, with minimal permissions - and those cryptographically random 40 character upper, lower, number passwords are then pretty good (skip symbols, length trumps character set size, and 40+ is good)
False. One, that super user password is for emergencies; have your own account as well (for auditability. Two, your scripts use their own less permissioned usernames; those still run. Three, with physical access to the machine, you can always recover and/or reset the super user password - it just takes some work.
As strong as possible. Use random passwords as long and as with as many different characters as the database will let you. Do not try to remember them. If you pick passwords that you can easily remember, they are probably to weak.
In this context I find it more relevant to how you manage your passwords and secrets. You should ideally set an as strong (and unique) passphrase as possible. With that said, you can reach a high level of entropy by just concatinating words together.
That is a viable solution if you make sure that there is unique accounts (not superuser) to your individual scripts, with the principle of least privilege. You should not give more privileges than needed for your scripts to run without permission constraints.
If you can implement 2-factor authentication for your superuser, any other accounts intended for manual access this becomes less of a concern. This would mitigate many, if not all of the attack vectors you're concerned about. I haven't done this myself for PostgreSQL in particular but there is some write-ups on it online.
okay - tried changing the password in the database and the parameters.php but got an 500 server error - putting in the old pwd on both ends got the shop back functioning. Anything else I cound have overlooked?
Unfortunately, there is no such file (config/parameters.php) even after installation. But docummentation says it must be. Everything works. How??
EDIT:
found it on /app/config/parameters.php
confusion was because of /config folder
As part of it we need to pass the Qlik Sense Service account password to higher management. Wanted to understand should we change/pass the Qlik Sense repository database password as well? Also if we need to change the password for the Qlik Sense repository database password what are the steps required?
b37509886e