Remove Exercises Remove Mining Remove Passwords Remove Workshop
article thumbnail

DB2 10 for z/OS and Enterprise Identity Mapping

Robert's Db2

In connecting to DB2, the application utilizes a particular ID and password. Ask each user to keep track of, and to use as appropriate, a RACF ID (and password) in addition to his or her network ID? That trusted context would define the circumstances in which the privileges granted to a role could be exercised by a user.

article thumbnail

Project Svalbard: The Future of Have I Been Pwned

Troy Hunt

Increasingly, I was writing about what I thought was a pretty fascinating segment of the infosec industry; password reuse across Gawker and Twitter resulting in a breach of the former sending Acai berry spam via the latter. And while I'm on Sony, the prevalence with which their users applied the same password to their Yahoo!

article thumbnail

Project Svalbard, Have I Been Pwned and its Ongoing Independence

Troy Hunt

How HIBP runs across the various Azure services, the Cloudflare dependencies, how I recover if things go wrong and then how that's managed across different autonomous parts of the project such as the HIBP website, the Pwned Passwords service etc etc. Collectively, we agreed to put pens down. I spoke at CERN.

IT 135