What type of encryption is firefox using for password protection and how trustworthy is it

I would like to know what kind of encryption FF uses and how I know I can trust it? This is not a bone of contention with FF, I love the product, rather it is just a concern I have that will convince me to let FF manage my financial passwords. Thanks for any assistance with understanding this issue more completely.

The degree of protection very much depends on how strong your master password is.
When using a master password, the data is encrypted using [http://www.tropsoft.com/strongenc/des3.html Triple DES Encryption in CBC mode]. This level of encryption is good for general purpose use. The weak point it the master password, if you have a weak master password there are programs available that will be able to crack the master password, they often do this by using a brute force method. If you use a strong master password, the brute force method will need a very long time to crack passwords. For details on password strength and creating strong passwords see http://en.wikipedia.org/wiki/Password_strength and http://luxsci.com/blog/security-simplified-the-basesuffix-method-for-memorable-strong-passwords.html

Similar Messages

  • What is the max memory Firefox uses to display pages and how to increase it ?

    Hello everyone,
    I am using the latest build of Firefox x86 on Windows 8.1 and I want to know what is the maximum memory that firefox uses to display web pages ie. What is the maximum size that a page can be ??
    Also how do I increase that limit ?? is there anything in the about:config of Firefox to that ?

    I haven't tested this, or researched in the source code, but if you do not need the file to be parsed as HTML in the browser, and instead you have Firefox treat it as a download, I imagine that would work around the limitation you've encountered.

  • I have a new Mac with usb 3.0 ports. What type of cable do I use for an old usb 1 printer

    I have a new IMac with usb 3 ports. What type of cable do I use for conncting on older usb 1 device?

    AFAIK, use the USB 3.0 port to the printer. It should be backward compatible. If not, return the useless computer or get a new printer.

  • What APPS are folks using for password protection?

    What are folks using for password protection?

    Miss Dee wrote:
    I'm looking for a way to save all my passwords to one place and then going to that place and pulling out the password I need. I have so many passwords, I just can't remember them. I thought that having the keychain would allow someone to sign in as me and then get the password.
    Does this make sense to you?
    Sorry, it isn't entirely clear to me, lets see if I understand correctly…
    The 'anyone can see my passwords when my account is logged in' issue is resolved by having a different password on the keychain compared to the user account, but it can make life frustrating to enter the password time after time, but security does conflict with convenience.
    Open up Keychain Access & take a look at an existing item in your login keychain - it should still ask for the keychain password to view the password for that item. By default that is the user account password.
    You can add extra passwords (and secure notes) to keychain if you have some that are not currently saved in the keychain. If any passwords are 'super secret' add them into another keychain & only unlock that when you need to do so, it will stop the OS using these automatically.

  • What is the use for lock object and how to use the lock objects

    Hi Guru's,
    I am new to ABAP .Can you please clarify the that what is the use of lock object and how to use the loct object .what is use of the Deque & Enque  function modules .

    hi ,
    below are some minfo about lock objects :
      Lock Objects
    These types of objects are used for locking the access to database records in table. This mechanism is used to enforce data integrity that is two users cannot update the same data at the same time. With lock objects you can lock table-field or whole table.
    In a system where many users can access the same data, it becomes necessary to control the access to the data. In R/3 system this access control is built-in on database tables. Developers can also lock objects over table records.
    To lock an object you need to call standard functions, which are automatically generated while defining the lock object in ABAP/4 dictionary. This locking system is independent of the locking mechanism used by the R/3 system. This mechanism also defines LUW i.e. Logical Unit of Work. Whenever an object is locked, either by in built locking mechanism or by function modules, it creates corresponding entry in global system table i.e. table is locked. The system automatically releases the lock at the end of transaction. The LUW starts when a lock entry is created in the system table and ends when the lock is released.
    Creating Lock Objects
    Lock object is an aggregated dictionary object and can be defined by using the following steps:
    o From initial data dictionary screen, enter the name for the object, Click Lock object radiobutton and then click on Create. The system displays a dialog box for Maintain Lock Objects screen
    o Enter short text as usual and the name for primary table.
    -Save
    -Select Tables option
    From this screen you can:
    Select secondary tables, if any, linked by foreign key relationship.
    Fields for the lock objects. This option allows you to select fields for objects (R/3 system allows locking up to record level). Lock object argument are not selected by user but are imposed by the system and includes all the primary keys for the table.
    1) Exclusive lock: The locked data can only be displayed or edited by a single user. A request for another exclusive lock or for a shared lock is rejected.
    2) Shared lock: More than one user can access the locked data at the same time in display mode. A request for another shared lock is accepted, even if it comes from another user. An exclusive lock is rejected.
    3) Exclusive but not cumulative: Exclusive locks can be requested several times from the same transaction and are processed successively. In contrast, exclusive but not cumulative locks can be called only once from the same transaction. All other lock requests are rejected.
    Also, last but not the least, locking the object is logical (locking with any enqueue ) .so, you have to use the lock object while trying to access from second program .
    reward if helpful ,
    Regards,
    Ranjita

  • What type of DVD should I use for Windows Backup?

    I am wanting to do my Windows Backup and I was wondering what type of DVD media I should use. Is it better to use a RW or only R type DVD.
    I have an HP Omni 220-1180qd, A5W89AV#ABA, running Win7 64 bit.
    I thought I read it can use CD's, DVD's but I want to know which would be the better choice.
    Thanks for any help and all help is appreciated.
    This question was solved.
    View Solution.

    Honestly, an external hard drive would be a better choice. The difference between +R and +R/W is that +R is "Recordable" and +R/W is "Re-Writable". If you intend on making periodic backups, go with an extrernal hard drive... If you intend on making very few backups, consider the DVD+R discs.
    Frank
    {------------ Please click the "White Kudos" Thumbs Up to say THANKS for helping.
    Please click the "Accept As Solution" on my post, if my assistance has solved your issue. ------------V
    This is a user supported forum. I am a volunteer and I don't work for HP.
    HP 15t-j100 (on loan from HP)
    HP 13 Split x2 (on loan from HP)
    HP Slate8 Pro (on loan from HP)
    HP a1632x - Windows 7, 4GB RAM, AMD Radeon HD 6450
    HP p6130y - Windows 7, 8GB RAM, AMD Radeon HD 6450
    HP p6320y - Windows 7, 8GB RAM, NVIDIA GT 240
    HP p7-1026 - Windows 7, 6GB RAM, AMD Radeon HD 6450
    HP p6787c - Windows 7, 8GB RAM, NVIDIA GT 240

  • What type of dvds should i use for writing with hpenvy touchsmart

    what type dvds are writable in the pc
    This question was solved.
    View Solution.

    Hi,
    What is your "hp envy touchsmart 17.1". Normally you can use blank DVD+R or DVD-R to write.
    Regards.
    BH
    **Click the KUDOS thumb up on the left to say 'Thanks'**
    Make it easier for other people to find solutions by marking a Reply 'Accept as Solution' if it solves your problem.

  • What is OpachKiru.zipl sbRecovery.reg that is password protected and on my computer ? Avast finds it and cannot get rid of it.

    The computer is starting to run slow and initiate restore at startup. Avast virus was run. 8 new password protected files are found. C:P\...\OpachKiru.zip>sbRecovery.reg is one type, with a variant .ini
    or I have lzip, or I have 2.zip or 3.zip.
    Until these appeared I had no trouble . The internet sites like spybot say they came through firefox. The security of my computer is necessary and I look to you for help since you might be the most aware of this file and its purpose. Thank you

    Try a reset:
    Hold the Sleep and Home button down until you see the Apple logo.

  • What type of encryption should I use?

    I'm sorry for asking such a beginner question...but I'm a bit puzzled here.
    I am writing a program that needs to keep a gigantic (2 million +) database of videos. Ordinarily that would not be very difficult, but I have to also make sure that those videos never fall into the wrong hands. My idea is to take the video files themselves and shuffle the internal data around in such a way that no ordinary video player will be able to recognize the format. I don't mean just change the header stuff, I mean shuffle the bytes around. I would then make a custom player that unscrambles the video and then plays it.
    Unfortunately, I think that somebody with the proper know-how would be able to break this scheme rather quickly. So what I want to do is encrypt the entire file into something completely unintelligible. This means I need an encryption scheme that can take in any arbitrary size of file, and spit out a file that contains all the same information, but encrypted.
    From the little bit of research that I have done, AES seems to fit my needs, but is there something better? Are there other options that would fit my needs just as well?
    Thanks in advance

    You're asking how to use encryption to implement a DRM scheme. If you google on DRM+encryption, you'll see how difficult this is.

  • What type of chart should we use for comparing more than 200 items

    Hi Guys, 
    I have a Pie chart graph for comparing data items but this chart becomes cluttered or serves no purpose when categories increase up to 100 or 200 items.
    I have tried collected Pie but still facing same issue.
    When the numbers of Legends increases the chart will become cluttered and this will reduce it readability as shown in the image.  Please share your suggestions for suitable chart type or strategy to overcome this issue.
    Regards

    Hi,
    As you may know, the issue is caused by the excessive items in the category group of the pie chart. The most direct and effective way is to reduce the items in the category group. Generally, we are not always need the report to display all items in the chart.
    In this scenario, we can add a parameter in the report, then use the parameter to filter the corresponding values in the chart.
    Besides, in order to increase the chart readability, we can try to use Column Chart to display those values. And we can “Enable scale breaks” in the Vertical Axis. A scale break is a stripe drawn across the plotting area of a chart to denote a break in continuity
    between the high and low values on a value axis. Use a scale break to display two distinct ranges in the same chart area.
    Reference:
    Add a parameter to filter the data in SSRS
    Add Scale Breaks to a Chart (Report Builder
    and SSRS)
    Hope this helps.
    Thanks,
    Katherine Xiong
    Katherine Xiong
    TechNet Community Support

  • What type of power bank to use for iPhone 4s?, what type of power bank to use for iPhone 4s?

    For use to charge my iPhone 4S

    Hi tonyleesb,
    You normally use the Apple USB Power Adapter that came with the phone to charge it, although you can charge it from a computer or powered USB hub.
    iPhone and iPod touch: Charging the battery
    http://support.apple.com/kb/ht1476
    If you don't have your original iPhone power adapter you can also use a power adapter for an iPad:
    iPhone, iPad, iPod: Using iPad Power Adapters
    http://support.apple.com/kb/ht4327
    And of course you can buy either one if you need.
    Apple USB Power Adapter
    http://store.apple.com/us/search/Apple-USB-Power-Adapter#!
    Thank you for using Apple Support Communities.
    Nubz

  • Thunderbird will not allow me to use a group email I have been using for months, why and how do I do it please?

    I set up a group email for people that I send an email to at least once a month, I updated Thunderbird when the update came up and now when I have gone to send the email it has told me that it must be in the form of name@host, not my Groups name. How do I fix this problem without having to put each individual email address in each month

    This has been reported as [https://bugzilla.mozilla.org/show_bug.cgi?id=1060901 Bug #1060901]. If you have an account on Bugzilla, please consider voting for that issue.
    Several other people have sent in the same support request as you, noting this happened after they upgraded to version 31.1.
    The exact error message is: XXXX is not a valid e-mail address because it is not of the form user@host. You must correct it before sending the e-mail.
    '''This happens when your mailing list description includes several words separated by spaces.'''
    Although not ideal, these workarounds should let you use your mailing lists until a proper fix is implemented:
    * While composing an email open the address book and select the list you are trying to send to, highlight all the names in the list and drag them to the To: box. This uses your existing data without modifying it.
    * Replacing the blanks " " between the words in such lists' descriptions with an underscore "_". This requires modifying your mailing list(s) description(s).

  • WMI Packet Privacy - What type of encryption?

    Hi,
    I would like to know what type of encryption standard is used when Packet Privacy is enabled when performing WMI queries.
    Packet Privacy will encrypt the data retrieved from the query as opposed to the data being in clear text format when Packet Privacy is not used. 
    Thanks

    Hi,
    The most secure level (RPC Packet Privacy) encrypts parameter state for every remote procedure call (and therefore every DCOM method invocation). The level of RPC encryption, 40-bit or 128-bit, depends on the version of the Windows operating system that
    is running on the client and server computers
    For reference:
    Securing a Remote WMI Connection
    http://msdn.microsoft.com/en-us/library/windows/desktop/aa393266(v=vs.85).aspx
    If you have any feedback on our support, please click
    here
    Alex Zhao
    TechNet Community Support

  • SP 2013 Client Object Model: What credentials to use for Office 365 and sites behind ADFS 3.0?

    I'm using the SharePoint 2013 Client Object Model to access a site that is either in Office 365 or behind an ADFS 3.0 login screen, is it sufficient to use the new SharePointOnlineCredentials credentials
    or do I need other types of credentials for the sites behind ADFS 3.0 ? Is so, what type of credentials would I use for the sites behind ADFS 3.0?
    using (ClientContext ctx = new ClientContext(siteUrl))
    ctx.Credentials = new SharePointOnlineCredentials("some user", "a secure string password");
    while (ctx.HasPendingRequest)
    ctx.ExecuteQuery();
    // etc.

    Hi,
    According to your post, my understanding is that you want to know the ways to get credential either in Office 365 or sites behind ADFS 3.0.
    For Office 365, you can use SharePointOnlineCredentials Object to get credential. For SharePoint sites behind ADFS 3.0, you can use NetworkCredential Object:
    ctx.Credentials = new NetworkCredential(UserName, Password, Domain); 
    The link below will provide more information about using the ADFS FedAuth Token programmatically through the SharePoint Client Object Model:
    http://samirvaidya.blogspot.com/2013/05/using-adfs-fedauth-token.html
    Best regards
    Patrick Liang
    TechNet Community Support

  • Discussion: What file system do you use for external backups and why?

    I just got a brand new seagate 2TB hdd to act as an external backup.
    I use ext2 with it, because it's USB (sata->usb enclosure), and I'm not likely to connect it direct to a PC anytime soon (also my computer is old and I liek to keep ram usage down as much as possible)...
    What filesystems do you use\prefer for external backups.. and why?
    Also, what type of connection do you use (USB,eSATA,etc,) and size (ie larger then a disk on key..)?

    I used to use ext4 on a 1.5TB HD, but recently switched back to ext3—and a tiny NTFS partition for the ext2fsd install file. I realized I use this drive a lot more outside of my Linux environment than I thought, and it was a hassle (and also unsafe) to disable driver signatures at Windows boot just to get a dev version of ext2fsd to work.
    pseudonomous wrote:If portability to other operating systems is a concern, then fat32 is, unfortunately, still the best choice, unless you have single files bigger than 4gb, which would probably mean you want to use ntfs or ext2.
    While helping a friend with her external hard drive, I noticed another limitation of fat32: only 65535 file descriptors per directory. She tried to backup her entire NTFS Windows C: drive to a fat32 one. Took us a good while until we figured that out, and I couldn't find much about it on the net.

Maybe you are looking for

  • Printing logo in ALV report

    Hi, I've created an ALV report with a logo in the header. But, when i'm taking the printout ,the logo is not printed. How to solve this problem,..please help me . Thanks and regards. Rajesh

  • Heroes of newerth install, nothing but problems

    i hope this is the right place to post this but ive been trying to install HON for like 2 days now. ive searched all the forums and cant seem to get a straight answer. it seems like alot of people have this problem but no one can figure it out. so i

  • How secure is master password?

    Hi I have very sensitive information on my iBook. I can choose master password after screen saver/sleep or FileVault. FileVault encrypts the info which I feel uncomfortable with as it may make it difficult to backup. Can the password be removed by a

  • Export to After Effects CS3 in FCE 4 workflow.

    I set up my FCE 4 prefs to edit video in After Effects CS3. After I rendered the clip in FCE 4, I right clicked to >edit video in editor, After Effects CS3 opened and low and behold sat my clip with the same settings that my FCE 4 project had. After

  • Can someone help with my slow airport?

    I have tried everything, but when i connect to the net via my airport, i might as well write a letter and request the info be sent that way. I have reinstalled leapard, made sure i have all the current updates, checked and changed every setting on th