Jump to content

Search the Community

Showing results for tags 'Security'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Alfred 3
  • Make the Most of Alfred
    • Discussion & Help
    • Bug Reports
    • Alfred Feature Suggestions
    • Themes
  • Alfred Workflows
    • Share your Workflows
    • Workflow Help & Questions
  • Alfred v2 Themes
  • Alfred Remote for iOS
    • Alfred Remote Discussion & Help
    • Remote Connection Troubleshooting

Categories

  • Articles
    • Forum Integration
    • Frontpage
  • Pages
  • Miscellaneous
    • Databases
    • Templates
    • Media

Categories

  • New Features
  • Other

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Twitter


Website URL


Jabber


Location


Interests

Found 12 results

  1. When I go to eject drives using Alfred (usually installer DMGs) I've been seeing this Volumes/firmwaresyncd.Ux5C91 as the first suggestion. This has persisted across many reboots. It's not going away. A screenshot is attached below. I don't see the supposed volume in Finder, GUI Disk Utility, nor via Terminal command "diskutil list". As far as I can tell the first hit with the curved return arrow is Alfred's best guess or perhaps a cached shortcut to a volume that no longer exists or something like that. When I did a search for the volume, I came across a similar question. It's not spel
  2. Hello all, I'm new here, but recently started using Alfred on daily basis. I've been having problems working with passwords so I've created my own workflow just for retrieving credentials through Alfred app for password store created with pass utility, the usage is pretty simple: just type p followed by a password phrase from your password store, then select matching entry and password will be copied to the clipboard. I've written short blog post about it @ http://blog.konradwasowicz.com/magical-passwords-and-how-to-wrangle-them/ . You can find ready to use workflow on my gith
  3. Description: I tried some of the current workflows that act as password generators but none of them were simple enough for my purpose so I came up with this one. From my perspective (and based on my needs) a password generation tool should be something straightforward - it doesn't need to require an active internet connection and doesn't need to offer complex options as the result. Having said that, this workflow doesn't aim to generate passwords that are the topmost in terms of security level - it tries to balance simplicity and performance with a good amount of security. Some out
  4. Generate secure random passwords from Alfred. Uses /dev/urandom as source of entropy. Features Passwords can be generated based on strength or length. Offers multiple generators, including based on real words and pronounceable pseudo-words generated with Markov chains. Shows the strength of each generated password. Strictly offline — it's safer not to outsource your security to a webservice. Download & Installation Get the workflow from the GitHub releases page or Packal. Basic Usage pwgen [<strength>] — Generate passwords of the specified strength. Strength can be either
  5. The pass password manager (http://www.passwordstore.org) is a password manager that aims to use primarily existing unix tools such as GPG and git to store and sync passwords. What attracted me to pass is that I want my passwords to sync between my phone and my computer, and I want that syncing to be free (I have used LastPass for a while, but have just been opening the mobile website whenever I needed a password—not a great solution). Pass offers that, with a standard format usable by an Android app and an iOS app. Pass has a quite good user interface for a command-line tool, including a
  6. This is a simple workflow to generate a 32 byte salt using Python's os.urandom(). Options to output as a byte string or encoded to base-64. Repo: https://github.com/gcallsen/alfred-2-salt-generator Download Workflow Directly: https://github.com/gcallsen/alfred-2-salt-generator/raw/master/generate_salt.alfredworkflow
  7. Hi, I'm thinking about upload my alfred.Alfredpreferences folder to my Github dotfiles repo and I wanted to know which folders contains sensible data to add them to .gitignore. I know that clipboard and some workflows should be treated as sensible data but I want to know if I should add more folders to this list. Another question I have it's if this UUID contains sensible info too and what's its purpose Alfred.alfredpreferences/preferences/local/<UUID> Thanks!
  8. I'm a noob and loving Alfred 2. I've imported a bunch of workflows and am wondering if they pose any security risks. Can malware, viruses or keystroke loggers be added to my system by way of an imported workflow? Are workflows safe? Does running anti-virus on them before import do any good? What precautions does Alfred 2 take to make sure that no malevolent code gets added to my mac? Thanks for the app. It's really well done!
  9. hyper-paranoid question here- are all url/file search queries stored, even if you disable 'query history' / 'URL history' / clipboard? what if you enable these features, will the query cache be cleared once you clear those feature histories? i would like to use Alfred for all web searches instead of a browser, but if i am piping searches i would normally enter directly on HTTPS search sites, are these queries instead being recorded in plain text somewhere before they reach the HTTPS site? could queries theoretically be sent by way of scripts in imported workflows, if the developer designed
  10. This workflow generates some useful checksums from file contents. It is implemented as file action which makes it easy to use! It works pretty nice with my "Last changed files" workflow and also can be used to checksum a file in finder by setting a hotkey to the "File Selection" in "Find File". You can download it here: https://github.com/oderwat/alfredworkflows/raw/master/Checksums.alfredworkflow My other workflows are here: https://github.com/oderwat/alfredworkflows Versions: V1.0 - Initial releases
  11. I've created a workflow for SuperGenPass available here. The Run Script action in the workflow includes comments that describe how to customize it. The included Ruby script "sgp" can also be used directly from the command line; type ./sgp --help in the workflow directory for more information.
  12. Hey everyone, Just rustled up a quick workflow to generate a password of any length and automatically send it to the clipboard, with an option for your generated password to include non-alphanumeric characters in addition to alphanumeric ones or limit it to just alphanumeric characters. Whilst this not as secure a means of generating a password in comparison to tools such as 1password (as the password will be stored in the clear in the clipboard), I figured it might be useful for some of you denizens of the Alfred forums! So, for example, entering 'pwg 15' would result in a string
×
×
  • Create New...