#Password Generators
Explore tagged Tumblr posts
Text
What Encryption Specifications Do Safe Password Generators Use?

Safe password generators employ innovative encryption standards to assure the honesty and discretion of generated passwords. Typically, they use Advanced encryption Requirement (AES) for symmetric encryption and RSA for asymmetric encryption. These methods not just secure sensitive data but additionally facilitate safe and secure key exchanges. Nonetheless, the efficiency of these generators additionally depends upon their implementation of various other critical techniques, such as hashing and salting, elevating important inquiries concerning finest practices in password protection.
Understanding Password Creation Algorithms
Although numerous password generation algorithms exist, they fundamentally operate the concepts of randomness and worsening to develop safe and secure passwords. A online password generator usually employs these algorithms to guarantee that the passwords generated are immune to brute force assaults and other forms of unapproved gain access to. The random password generator utilizes decline as a key part, attracting from diverse sources, such as system time, individual input, or environmental noise, to enhance changability. This randomness is crucial for creating passwords that are not just complicated however also special. In enhancement, effective formulas usually consist of criteria for password length and character selection, producing combinations that significantly increase protection. Inevitably, the sophistication of these algorithms straight affects the stamina of the passwords produced.
Typical encryption Standards being used
encryption requirements play a critical role in guarding delicate information, ensuring that data remains safe from unauthorized accessibility. Amongst one of the most commonly used criteria in protected password generators are Advanced encryption Requirement and RSA. AES, a symmetrical encryption algorithm, is favored for its performance in securing data, making it perfect for generating random passwords. On the other hand, RSA, an asymmetric encryption requirement, is made use of for safe key exchanges and digital signatures, giving an extra layer of safety and security. Executions typically combine these criteria with protected hashing formulas to bolster stability. The toughness of these encryption methods considerably adds to the total safety of a strong password generator, making it possible for users to develop and save complicated random passwords safely.
The Function of Salt as well as Hashing

While strong password generation concentrates on developing complex passwords, the procedures of salting and hashing are critical in boosting password safety. Salting includes adding an one-of-a-kind worth, or "salt," to every password before hashing, ensuring that identical passwords produce various hash results. This mechanism significantly minimizes the threat of pre-computed assaults, such as rainbow table assaults. Hashing, on the various other hand, transforms the salty password right into a fixed-length string, making it not practical to reverse-engineer the initial input. Password generators that make use of strong password concepts inherently gain from these procedures, as they assure that also one of the most intricate passwords remain safe and secure. With each other, salting and hashing form a durable framework for securing user qualifications throughout numerous applications. Guarantee your information remains safe and secure by Sneak a peek here that's nearly difficult to fracture.
Best Practices for Password Protection
Password protection requires adherence to developed finest techniques to properly safeguard sensitive info. Customers should focus on the generation of strong passwords that combine top and reduced instance letters, numbers, and unique characters, making them hard to presume. Using an online password generator can streamline this process, ensuring randomness and intricacy. Additionally, executing two-factor verification (2FA) improves safety and security by calling for a second verification technique. Regularly updating passwords and preventing the reuse of passwords across multiple accounts are essential strategies to alleviate threat. Using password managers can better promote protected storage space and monitoring of passwords. Eventually, complying with these ideal practices significantly lowers susceptability to unapproved gain access to, thus maintaining the stability of sensitive information.
Verdict
In verdict, safe password generators leverage advanced encryption criteria such as AES and RSA to guarantee the privacy and stability of created passwords. By using symmetrical encryption for effectiveness and uneven encryption for secure key exchanges, these systems improve total safety. In addition, the unification of salting and hashing strategies better fortifies password defense versus unauthorized gain access to. Complying with these best methods is necessary for maintaining durable password security in a significantly digital landscape.
0 notes
Text
What Encryption Requirements Do Safe And Secure Password Generators Usage?

Safe and secure password generators employ sophisticated encryption requirements to assure the integrity and privacy of generated passwords. Commonly, they use Advanced encryption Criterion (AES) for symmetrical encryption and RSA for crooked encryption. These techniques not only shield sensitive information but additionally promote protected key exchanges. Nonetheless, the effectiveness of these generators additionally rests on their application of other important techniques, such as hashing and salting, elevating essential inquiries concerning finest techniques in password protection.
Recognizing Password Creation Algorithms
Although numerous password generation algorithms exist, they fundamentally operate the principles of randomness and degeneration to create safe passwords. A secure password generator generally utilizes these formulas to ensure that the passwords generated are immune to strength assaults and other forms of unapproved accessibility. The random password generator uses decline as a key component, drawing from diverse resources, such as system time, customer input, or environmental noise, to boost changability. This randomness is crucial for producing passwords that are not only intricate but additionally one-of-a-kind. In enhancement, efficient formulas typically consist of criteria for password length and character selection, producing combinations that significantly increase safety. Inevitably, the class of these formulas straight affects the stamina of the passwords created.
Typical encryption Standards being used
encryption criteria play a crucial role in securing sensitive info, making sure that data continues to be safe from unauthorized accessibility. Amongst the most frequently made use of requirements in protected password generators are Advanced encryption Standard and RSA. AES, a symmetrical encryption algorithm, is favored for its performance in securing data, making it ideal for generating random passwords. Conversely, RSA, an asymmetric encryption criterion, is used for secure key exchanges and digital signatures, giving an extra layer of security. Executions commonly incorporate these standards with safe and secure hashing formulas to boost stability. The toughness of these encryption approaches substantially adds to the general security of a random password generator, enabling users to create and store intricate random passwords securely.
The Role of Salt and Hashing

While strong password generation concentrates on creating complicated passwords, the procedures of salting and hashing are essential in improving password security. Salting entails including an one-of-a-kind worth, or "salt," to every password prior to hashing, ensuring that identical passwords produce different hash outcomes. This mechanism significantly minimizes the threat of pre-computed strikes, such as rainbow table assaults. Hashing, on the various other hand, transforms the salted password into a fixed-length string, making it unwise to reverse-engineer the original input. Password generators that make use of strong password concepts naturally gain from these processes, as they ensure that also the most complicated passwords stay secure. With each other, salting and hashing form a robust structure for protecting individual credentials throughout various applications. Don't leave behind your accounts at risk, Look at this for a solid password today and improve your digital safety.
Best Practices for Password Safety
Password protection requires adherence to developed best practices to properly guard sensitive information. Users ought to focus on the generation of strong passwords that incorporate upper and lower situation letters, numbers, and unique characters, making them hard to guess. Using an online password generator can simplify this procedure, guaranteeing randomness and complexity. In addition, executing two-factor verification (2FA) improves safety and security by requiring a secondary verification technique. Routinely upgrading passwords and preventing the reuse of passwords across multiple accounts are essential methods to mitigate threat. Employing password managers can better promote safe and secure storage space and administration of passwords. Eventually, following these finest techniques substantially lowers susceptability to unauthorized access, thus maintaining the honesty of delicate data.
Conclusion
Finally, protected password generators take advantage of progressed encryption requirements such as AES and RSA to ensure the discretion and stability of created passwords. By utilizing symmetric encryption for performance and uneven encryption for protected key exchanges, these systems improve total safety and security. Furthermore, the unification of salting and hashing techniques additionally strengthens password security versus unauthorized gain access to. Adhering to these ideal practices is necessary for preserving durable password security in a significantly digital landscape.
0 notes
Text
What Encryption Specifications Do Secure Password Generators Usage?

Secure password generators utilize innovative encryption standards to guarantee the stability and privacy of created passwords. Typically, they utilize Advanced encryption Criterion (AES) for symmetrical encryption and RSA for asymmetric encryption. These approaches not just shield delicate data yet likewise assist in safe key exchanges. Nonetheless, the performance of these generators additionally depends upon their implementation of other critical strategies, such as hashing and salting, increasing essential concerns about ideal methods in password safety and security.
Comprehending Password Creation Algorithms
Although various password generation formulas exist, they essentially operate the principles of randomness and degeneration to develop safe passwords. A random password generator commonly employs these algorithms to assure that the passwords created are resistant to strength attacks and various other forms of unauthorized gain access to. The random password generator uses decline as a key element, attracting from varied resources, such as system time, customer input, or environmental noise, to improve unpredictability. This randomness is important for generating passwords that are not only complex however additionally one-of-a-kind. Additionally, reliable algorithms typically include specifications for security key size and character range, creating combinations that significantly raise security. Ultimately, the sophistication of these algorithms straight influences the strength of the passwords created.
Common encryption Specifications in Usage
encryption requirements play a crucial role in safeguarding delicate info, guaranteeing that data continues to be safe and secure from unauthorized access. Amongst the most commonly made use of criteria in safe and secure password generators are Advanced encryption Standard and RSA. AES, a symmetric encryption algorithm, is preferred for its effectiveness in encrypting data, making it ideal for producing random passwords. Conversely, RSA, a crooked encryption standard, is utilized for safe and secure key exchanges and digital trademarks, providing an added layer of protection. Applications typically integrate these criteria with safe hashing algorithms to boost integrity. The toughness of these encryption approaches greatly adds to the overall safety and security of a online password generator, making it possible for individuals to create and store complex random passwords safely.
The Role of Salt and Hashing

While strong password generation concentrates on producing intricate passwords, the procedures of salting and hashing are essential in improving password security. Salting includes including a distinct value, or "salt," per password before hashing, ensuring that similar passwords create various hash results. This system significantly minimizes the danger of pre-computed attacks, such as rainbow table assaults. Hashing, on the various other hand, changes the salty password into a fixed-length string, making it unwise to reverse-engineer the initial input. Password generators that use strong password principles naturally gain from these processes, as they guarantee that even the most complex passwords remain secure. Together, salting and hashing type a robust framework for safeguarding customer qualifications throughout different applications. Maintain your details secure by Sneak a peek here that creates your accounts impervious.
Best Practices for Password Protection
Password security requires adherence to developed best techniques to successfully secure delicate info. Users must focus on the generation of strong passwords that integrate upper and reduced case letters, numbers, and special characters, making them challenging to guess. Using an online password generator can streamline this procedure, making certain randomness and complexity. Additionally, applying two-factor authentication (2FA) enhances safety and security by calling for a second verification approach. Regularly updating passwords and avoiding the reuse of passwords throughout multiple accounts are essential strategies to mitigate risk. Using password managers can additionally assist in protected storage space and administration of passwords. Inevitably, following these finest methods significantly lowers susceptability to unauthorized accessibility, consequently keeping the honesty of sensitive data.
Final thought
In verdict, protected password generators leverage advanced encryption criteria such as AES and RSA to ensure the privacy and integrity of generated passwords. By employing symmetric encryption for performance and asymmetric encryption for secure key exchanges, these systems improve total safety and security. In addition, the incorporation of salting and hashing techniques even more fortifies password defense versus unauthorized access. Adhering to these best methods is necessary for preserving durable password security in a progressively digital landscape.
0 notes
Text
How Safe And Secure Are Random Security Password Generators Versus Hackers?

When it concerns shielding your online accounts, random password generators can be a powerful tool. They create complicated passwords that resist hacking attempts, specifically when they blend uppercase, lowercase, numbers, and icons. However, not all generators are produced equivalent - some might have hidden vulnerabilities. Comprehending the toughness and weaknesses of these tools is important for your safety method. What variables should you consider to guarantee your passwords continue to be uncompromised?
How Random Password Generators Operate?
While you may assume that producing a strong password is as easy as stringing together random letters and numbers, the mechanics of random password generators disclose an extra complex procedure. These tools make use of algorithms to ensure that the produced passwords possess a high level of worsening, making them tough to anticipate. A strong password generator usually integrates numerous character types - uppercase, lowercase, numbers, and icons - into its result. By attracting from substantial character collections, the random password generator decreases the risk of repetition and improves safety and security. In addition, these generators can produce passwords of varying sizes, allowing you to personalize toughness according to your demands. Understanding these auto mechanics can aid you value how a properly designed strong password generator successfully fights hacking efforts.
Advantages of Utilizing Random Password Generators
As you browse the complexities of on the internet safety and security, making use of random password generators supplies significant benefits that can enhance your digital safety. Primarily, a secure password generator produces facility, unique passwords that are tough for hackers to split. By counting on formulas, these tools guarantee that each random password is not just random yet additionally contains a mix of characters, numbers, and signs, making them extra resistant against brute-force strikes. Furthermore, utilizing a strong password generator gets rid of the lure to reuse passwords throughout several websites, considerably lowering your susceptability. With the boosting refinement of cyber hazards, adopting a secure password generator is an aggressive action toward safeguarding your personal info and maintaining your online privacy. Safeguard your on-line accounts today by developing a solid password together with https://www.strongpasswordgenerator.org/ that will certainly shield your individual information.
Possible Limitations and Vulnerabilities

Although random password generators provide boosted safety and security, they aren't without their vulnerabilities and restrictions. One major concern is that not all on-line password generators use genuinely random algorithms. Some may count on foreseeable patterns, making it much easier for cyberpunks to fracture what you believe is a strong password. Additionally, if the generator shops your passwords online, you take the chance of revealing sensitive data if the service obtains hacked. Additionally, individual behavior can weaken the effectiveness of created passwords; if you reuse them throughout numerous sites, a solitary violation might compromise your accounts. Ultimately, while these tools develop intricate passwords, you still need to bear in mind or firmly store them, which can result in human error or oversight.
Ideal Practices for Enhancing Password Protection
To enhance password protection, it is vital to take on a multifaceted technique that surpasses simply utilizing random password generators. Initially, you must generate strong password that are complex, incorporating a mix of uppercase and lowercase letters, numbers, and symbols. Use a random password generator strong enough to develop one-of-a-kind passwords for each account, minimizing the risk of a solitary violation impacting several services. Furthermore, enable two-factor verification anywhere possible; this includes an extra layer of protection. Consistently upgrade your passwords and avoid reusing them throughout various platforms. Ultimately, think about utilizing a password manager to firmly store your passwords and streamline the process of producing strong passwords. By applying these methods, you substantially reinforce your total password protection.
Final thought
In summary, while random password generators greatly boost your defenses against hacking efforts, their effectiveness pivots on the underlying algorithms and your use behaviors. By making certain passwords are unique and integrating two-factor authentication, you can even more boost your security. Bear in mind that also the most effective tools need your diligence; stay clear of reusing passwords and consider secure storage alternatives. By taking these steps, you can take full advantage of the protective advantages of random password generators.
0 notes
Text
The Benefits of Using a Strong Password Generator for Everyday Security

In an era where digital threats are increasingly pervasive, the implementation of robust security measures is essential for safeguarding personal information. A strong password generator serves as a practical tool, not only facilitating the creation of complex and unique passwords but also addressing the pervasive issue of password fatigue. By automating this essential aspect of online security, users can greatly reduce vulnerabilities linked to poor password practices. However, the effectiveness of such tools extends beyond mere convenience; understanding their broader implications on online privacy is imperative. What other benefits might emerge from adopting this technology?
Enhanced Security Measures
In today’s digital landscape, where cyber threats are increasingly sophisticated, implementing robust security measures is paramount. One critical aspect of safeguarding sensitive information is the use of a strong password generator. Such tools create strong passwords that are complex, unique, and resistant to brute-force attacks. A strong password typically incorporates a mix of uppercase and lowercase letters, numbers, and special characters, greatly enhancing security. Utilizing a password generator eliminates the risks associated with weak, easily guessable passwords, which are often exploited by cybercriminals. Additionally, it fosters the practice of regularly updating passwords, thereby mitigating the likelihood of unauthorized access. Essentially, employing a strong password generator not only fortifies security protocols but also instills a proactive approach to digital safety.
Time-Saving Convenience
Time efficiency is a crucial factor in managing digital security, and a strong password generator offers significant convenience in this regard. Traditional password creation often involves time-consuming processes of brainstorming, testing, and modifying passwords to guarantee strength and uniqueness. In contrast, a password generator automates this process, producing complex passwords in mere seconds, allowing users to focus on other critical security measures.
Moreover, these tools enable seamless integration with password managers, streamlining the storage and retrieval process. By eliminating the cognitive load associated with remembering multiple passwords, users can enhance productivity while maintaining robust security practices. Ultimately, leveraging a strong password generator not only fortifies security but also optimizes time management in an increasingly digital landscape.
Unique Password Creation

Creating unique passwords is essential for safeguarding sensitive information in today’s digital environment. The proliferation of data breaches necessitates that individuals employ distinct passwords for each account to mitigate the risk of unauthorized access. A strong password generator facilitates this process by creating complex and unpredictable passwords that adhere to best practices, including a mix of uppercase letters, lowercase letters, numbers, and special characters. This complexity greatly enhances password strength, making it challenging for automated hacking tools to compromise accounts. Additionally, unique passwords diminish the potential impact of breaches, as accessing one account does not grant access to others. Ultimately, leveraging a password generator is a critical strategy for ensuring robust security in an increasingly interconnected digital landscape.
Reduced Password Fatigue
Addressing the challenge of password fatigue is essential for maintaining effective digital security. As individuals manage numerous accounts, the cognitive load of remembering complex passwords often leads to the adoption of insecure practices, such as reusing passwords or opting for simpler variations. A strong password generator alleviates this burden by creating unique, robust passwords automatically. By removing the onus of memorization, users can focus on utilizing secure credentials without the mental strain associated with password management. This reduction in password fatigue not only enhances compliance with security protocols but also encourages users to maintain distinct passwords for each account. Consequently, the integration of a password generator directly contributes to a more secure online environment, minimizing the likelihood of breaches stemming from poor password practices.
Increased Online Privacy
The implementation of a strong password generator greatly enhances online privacy by ensuring that users adopt unique passwords for different accounts. This practice mitigates the risk of credential stuffing attacks, where hackers exploit reused passwords across multiple sites. By generating complex, random passwords, users considerably reduce the likelihood of unauthorized access to sensitive information. Additionally, strong password generators often incorporate additional features such as password strength assessments and secure storage options, further bolstering security. As data breaches become increasingly prevalent, the reliance on unique passwords fosters a more robust security posture. Ultimately, the utilization of a strong password generator is essential in maintaining online privacy, protecting personal data against evolving cyber threats.
Conclusion
In conclusion, the utilization of strong password generators greatly strengthens online security by facilitating the creation of complex, unique passwords that adhere to established best practices. These tools not only enhance security measures and reduce the likelihood of unauthorized access but also alleviate password fatigue associated with managing multiple accounts. Consequently, the adoption of strong password generators is essential for maintaining robust online privacy and mitigating the risks posed by evolving digital threats.
0 notes
Text
How Password Generators Help You Avoid Weak Password Pitfalls?

In an era where digital security is paramount, the prevalence of weak passwords poses significant risks to personal and organizational data. Password generators offer a sophisticated solution by crafting complex and unique passwords that mitigate the vulnerabilities associated with predictable patterns and password reuse. By understanding how these tools function and recognizing the common pitfalls they help avoid, users can enhance their cybersecurity posture. Yet, the effectiveness of these generators often hinges on the choices made by the user. What factors should one consider when selecting a password generator to maximize their digital security?
Understanding Password Weaknesses
A thorough understanding of password weaknesses is essential in the context of cybersecurity. Weak passwords often stem from predictable patterns, such as common phrases or easily guessable personal information. Attackers utilize various techniques, including brute force and dictionary attacks, to exploit these vulnerabilities. A random password generator can greatly mitigate these risks by creating complex passwords that are not easily decipherable. Such tools enable users to generate strong passwords comprised of an unpredictable combination of letters, numbers, and symbols, thereby enhancing security. Furthermore, the human tendency to reuse passwords across platforms exacerbates the issue, leading to compounded risks. Awareness of these weaknesses is critical in fostering better password practices and implementing effective security measures.
Benefits of Using Password Generators
Utilizing password generators offers numerous advantages that greatly enhance cybersecurity measures. To begin with, they create complex, random passwords that are less susceptible to hacking attempts, considerably reducing the risk of unauthorized access. In addition, password generators facilitate the use of unique passwords for each account, mitigating the dangers associated with password reuse. This strategy is critical, as a breach in one account can lead to cascading security failures across multiple platforms. Moreover, these tools often provide an easy-to-use interface, allowing users to generate and store passwords securely without the need for manual input. Finally, employing password generators fosters a discipline of password management, encouraging users to adopt stronger security practices overall, thereby creating a more robust defense against cyber threats.
How Generators Create Strong Passwords
When considering how password generators create strong password, it is essential to examine their underlying algorithms and mechanisms. These tools utilize complex algorithms that typically employ randomization techniques, ensuring the generation of characters from a wide range of possible selections, including uppercase letters, lowercase letters, numbers, and special symbols. By maximizing the character set, generators enhance password entropy, thereby increasing resistance to brute-force attacks. Moreover, many generators incorporate user-defined criteria, allowing individuals to customize length and complexity according to specific security requirements. This flexibility, combined with the systematic randomness of generation, results in passwords that are not only difficult to predict but also unique, greatly reducing the likelihood of reuse across platforms, a critical factor in maintaining robust digital security.
Avoiding Common Password Mistakes

Many individuals unknowingly compromise their digital security by falling into common password mistakes. A prevalent issue is the use of easily guessable passwords, such as “123456” or “password,” which fail to provide adequate protection. Additionally, many users rely on a single password across multiple accounts, amplifying vulnerability; if one account is breached, others are at risk. Moreover, neglecting to update passwords regularly can leave accounts exposed, especially after data breaches. The use of personal information, such as birthdays or names, should also be avoided, as these can be easily obtained by cybercriminals. By recognizing and addressing these pitfalls, individuals can greatly enhance their digital security and mitigate the risks associated with weak password practices.
Choosing the Right Password Generator
Selecting an appropriate password generator is essential for enhancing digital security, as the right tool can considerably aid individuals in creating strong, unique passwords. When evaluating password generators, consider their algorithm strength and the randomness of generated passwords. Look for features such as customization options, allowing users to specify length and complexity requirements, which can enhance password security. Additionally, guarantee that the generator does not store or transmit passwords, prioritizing user privacy. User reviews and security audits can provide insights into the generator’s reliability and effectiveness. Ultimately, the ideal password generator should balance usability with advanced security features, guaranteeing that users can confidently create robust passwords that mitigate risks associated with weak password practices.
Conclusion
In summary, the utilization of password generators greatly mitigates the risks associated with weak passwords. By leveraging advanced algorithms and extensive character sets, these tools produce complex, unique passwords tailored to individual security needs. This approach not only prevents password reuse but also addresses common vulnerabilities stemming from predictable patterns and personal information. Ultimately, adopting a password generator represents an essential step in enhancing digital security and safeguarding sensitive data against potential cyber threats.
0 notes
Text
just daniel things.........
#didn't race not on the grid forgot all soc media passwords hasn't even been seen by general public in weeks and yet he's still that bitch#daniel ricciardo#chinese gp 2025
150 notes
·
View notes
Text
can you tell he's my fav trek character
click for higher quality, reblog don’t repost
#i remembered my password#my art#art#star trek#star trek art#data soong#data star trek#star trek the next generation#brent spiner
618 notes
·
View notes
Text
oh my god thing 1 and thing 2 reunion


#IM SO SAT#flavio's admin adventures are hilarious and they generally coincide with him doing well. he's never giving up the password i fear#idiot4idiot interview will be so fun#jannik sinner#flavio cobolli#tennis#halle open 2025#flavio's admin shenanigans
123 notes
·
View notes
Text
Keep thinking about Naveen calling the hatch a gay bar and now I need to write a fic where the castaways actually turn the hatch into a gay bar (with the supplies they have available) and throw a party 💔
#Rose and Bernard made most of the decorations obvs#Charlie’s on door duty for the first half of the night and keeps asking people ‘what’s the password?’ even though there is none#Kate teaching Hurley how to make mixed drinks out of the limited ingredients they have (she’s definitely putting too much alcohol)#Sawyer and Shannon playing Slap Jack and downing shots faster than They should#Sayid smoking one of Charlie’s last cigarettes and passing it around to everyone in the hatch because he’s generous like that#Claire asking unsuspecting victims if they want a hurricane shot#Desmond saying sure then getting soaked/the absolute dogshit smacked out of him#Sun and Jin are on sober duty (cause pregnant 💔) but Hurley makes them non-alcoholic Jell-O shots so they feel included#Jack getting drunk and coming out to literally anyone who sits next to him#‘I think I’m bi’ brother we know#lost#lost abc#lost 2004
24 notes
·
View notes
Text
I think it’s cute if lemongrab can go to wizard city, like the wall lets him in and he's never thought about it before or questioned it, but he doesn’t really exactly grok that he’s A Wizard
he knows that he doesn’t get in trouble for going there, but he knows that some people do. which is kind of a big deal for him
#adventure time#wizard city#<- cuz larry#lemongrab#larry#digital#being a wizard is really more of a molecular thing than an education/trained-in thing#you’re deeply sad and mad and magic glued itself onto your cells bc of it? OK! the wall will let you in#you’re genetically predisposed to magic and also it’s tearing you apart mentally to be able to see the spirit realm and stuff?#OK! the wall will let you in#the wall clearly isn’t trained on each specific wizard. because there’s a SCHOOL OF NEW UNTRAINED CHILDREN#who could all get in. unless they all had to go to an early orientation to teach the wall their voice so they could enter the city#insane.#wc and its population of baby wizards is a menace to ME SPECIFICALLY#okay wow that was all unrelated.#i do think lemongrab would have a problem with the password.#some kindly wizard would be like oh sure young lad password's 'wizards rule' and lg would be like Excuse Me.#wizards rule WHAT. (wall disappears)#and the other guy'd be like well like they just rule in general. dont you agree. raises eyebrow. ahem. young wizard.#and lg would be like ummm i think they need to earn that kind of respeckt. >:/#he begrudgingly agrees it's OK because they 'rule' the city. so technically it is correct. but he has middling problems with it#as a guy who cares about saying correct statements and being precise
25 notes
·
View notes
Text
so the vimeo-based video sites don't have rss feeds (youtube and nebula both do), and generating an automatic web feed in inoreader doesn't work. BUT if you do manual setup of a web feed it's super easy, so i can finally stop missing when new episodes go up. i imagine it would work just as well with any other rss reader with the ability to generate web feeds/monitor site changes.
#original#how to rss#dropout#watcher#it would be so nice if i could generate a playlist of embedded videos from like six different websites lmao#bring back video podcasts i am begging#they can be password protected it's fine
34 notes
·
View notes
Text
did it. sent an email even though it hurt
#AGAIN this week!!!! it never ends!!!!!!!#me when they tell me to setup my work email a million times but they keep giving me the same instructions that dont fucking work#i think my work outlook account is an old wives' tale#it doesn't exist. i'm pretty sure#doesn't even give me a 'forgot password?' option to click. just tells me the default pw is wrong#i have no idea if they have it linked to my phone number or personal email that the district does have#bc it gives me no notifications or help in order to authenticate that it's really me. trying to get in there already.#MY WORK EMAIL IS A MYTH!!!#tales from diana#my favorite episode of buffy is the one where she fights my work email#in every generation there is a chosen one#she alone will stand against the vampires the demons and the forces of outlook#she is the slayer
8 notes
·
View notes
Note
do more voter fraud we can’t lose we can’t lose…i would do voter fraud if i knew how but alas
i’m doing this shit manual style since tumblr doesn’t make you verify your email but UNFORTUNATELY i have to go to WORK so my voter fraud crimes are on pause…but as soon as i get home assuming i am still alive i’m clocking right back in to the voter fraud factory!
#m.txt#ask#but i just have like the last part of the email in my pastebin so i keysmash + paste that#auto generated password from my browser + the first birrhday i can put in + the first suggested url#then vote log out repeat!#easy but time consuming#and is much easier on a computer than a phone if u are to attempt#i’m going to use a vpn tonight so i don’t get ip blocked again
8 notes
·
View notes
Text
does anybody else occasionally get jealous of their dad's work-son or is it just me who's crazy
#generally I don't begrudge brandon too much because its clear he has not gotten enough positive attention from a father figure#but sometimes he is doing too much at the BBQ and I feel the need to assert that I was here first and my birthday is the password
4 notes
·
View notes
Text
i hate cybersecurity bro i wish i could use the same password for everything but i CANT
#txt#saying this after typing in one of my many outrageous randomly generated passwords that i will never remember ever#and i always have to check my [sighs] physical password book
2 notes
·
View notes