• maniacalmanicmania@aussie.zone
      link
      fedilink
      English
      arrow-up
      8
      ·
      1 year ago

      Crontab generator was my gateway to all things ‘generator’. Looking for a quick way to construct something? Google it + generator to see if someone has created a generator site for it.

      • burrito@sh.itjust.works
        link
        fedilink
        arrow-up
        3
        arrow-down
        3
        ·
        1 year ago

        Just don’t be that guy that uses a website to generate passwords. If you’re going to generate passwords it needs to be a trusted utility that runs locally otherwise someone has your password.

        • brygphilomena@lemmy.world
          link
          fedilink
          arrow-up
          4
          arrow-down
          1
          ·
          1 year ago

          If the website generating the password a) doesn’t know the site/account and b) doesn’t know the username then it doesn’t matter. And c) with 2fa knowing a password doesn’t grant access by itself.

          If a site is decently coded, it would be run in client side scripting like JavaScript anyway. It wouldn’t require anything being sent to the site.

          • sirfancy@lemmy.world
            link
            fedilink
            arrow-up
            1
            ·
            1 year ago

            If a site is decently coded

            This is the crux of the issue. The average internet user, the kind of user going to a random website to generate a password, would not be able to find this out. For all we know, even without the username, a randomly generated password could be saved to a wordlist after it’s generated. That would be pretty smart, since now you have a list of known used passwords that someone went through the effort to generate to secure something more valuable. (Which would refute your points A and B)

            And your point C, not always. By your same logic, you’d be comfortable using “password” as long as you have 2FA? There is always a possibility of 2FA being bypassed through some other vulnerability depending on its implementation. This is why it’s TWO (or multi) factor authentication. In case one factor is compromised, you have another layer of defense. If you use a compromised password (by either using “password” or a sketchy password generator), then you’ve effectively reverted yourself back to one factor authentication. Or zero, if you didn’t have MFA.

            Don’t listen to anyone suggesting otherwise. Don’t use random websites. Either stick to a password manager to generate them for you, or take it completely offline with a dice roll-based generation.

    • thericcer@reddthat.com
      link
      fedilink
      arrow-up
      4
      ·
      1 year ago

      Oh how I wish I knew this existed years ago! My standard procedure is to go to systemd’s doc website and spend 10 minutes looking for the option I want.