Jump to content

Search the Community

Showing results for tags 'security'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Alfred 3
  • Make the Most of Alfred
    • Discussion & Help
    • Bug Reports
    • Alfred Feature Suggestions
    • Themes
  • Alfred Workflows
    • Share your Workflows
    • Workflow Help & Questions
  • Alfred v2 Themes
  • Alfred Remote for iOS
    • Alfred Remote Discussion & Help
    • Remote Connection Troubleshooting

Categories

  • Articles
    • Forum Integration
    • Frontpage
  • Pages
  • Miscellaneous
    • Databases
    • Templates
    • Media

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Twitter


Website URL


Jabber


Location


Interests

Found 12 results

  1. When I go to eject drives using Alfred (usually installer DMGs) I've been seeing this Volumes/firmwaresyncd.Ux5C91 as the first suggestion. This has persisted across many reboots. It's not going away. A screenshot is attached below. I don't see the supposed volume in Finder, GUI Disk Utility, nor via Terminal command "diskutil list". As far as I can tell the first hit with the curved return arrow is Alfred's best guess or perhaps a cached shortcut to a volume that no longer exists or something like that. When I did a search for the volume, I came across a similar question. It's not spelled exactly the same as mine but it's similar enough, randomly generated suffixes are common enough. I'm alarmed about the idea of having a hack on my system. I suspect it's much more mundane. Perhaps a cache isn't clearing in Alfred, or it's seeing a "secret" recovery partition or something. What can I do to get to the bottom of this?
  2. Generate secure random passwords from Alfred. Uses /dev/urandom as source of entropy. Features Passwords can be generated based on strength or length. Offers multiple generators, including based on real words and pronounceable pseudo-words generated with Markov chains. Shows the strength of each generated password. Strictly offline — it's safer not to outsource your security to a webservice. Download & Installation Get the workflow from the GitHub releases page or Packal. Basic Usage pwgen [<strength>] — Generate passwords of the specified strength. Strength can be either a number (1 or above) or a specific amount of entropy in bits, e.g. 128b. The default is 3, which corresponds to 96 bits of entropy. pwlen [<length>] — Generate passwords of the specified length. Default is 20. Strength differs depending on the generator (e.g. for 20 characters, strength can vary between 50 and >100 bits of entropy). pwconf [<query>] — Alter the default strength/length and activate/deactivate different generators. Password Generators Several different password generators are included by default, including: ASCII letters, digits and punctuation ASCII letters and digits ASCII letters and digits, excluding easily-confused letters and numbers Digits only Pronounceable, randomly-generated gibberish words Dictionary words Password Strength Please see the GitHub README for detailed information on the strength of the generated passwords and which settings you should (or shouldn't) use. The default strength of 3 is sufficient for most purposes (~6.5 years to guess the password on 2015 dedicated password-cracking hardware). Use 4 for very important stuff.
  3. Hello all, I'm new here, but recently started using Alfred on daily basis. I've been having problems working with passwords so I've created my own workflow just for retrieving credentials through Alfred app for password store created with pass utility, the usage is pretty simple: just type p followed by a password phrase from your password store, then select matching entry and password will be copied to the clipboard. I've written short blog post about it @ http://blog.konradwasowicz.com/magical-passwords-and-how-to-wrangle-them/ . You can find ready to use workflow on my github account https://github.com/exaroth/alfred-password-store. It's my first workflow so If you have any issues with it I'll be happy to fix them, also comments are super welcome. Cheers
  4. Description: I tried some of the current workflows that act as password generators but none of them were simple enough for my purpose so I came up with this one. From my perspective (and based on my needs) a password generation tool should be something straightforward - it doesn't need to require an active internet connection and doesn't need to offer complex options as the result. Having said that, this workflow doesn't aim to generate passwords that are the topmost in terms of security level - it tries to balance simplicity and performance with a good amount of security. Some output examples (using its default length): DeCW2V4SKBXWZVv 4s02A6M-uOsDA6ocGtrW8Hz-TssPaK As part of the password recipe I use symbols, lower/upper case letters and numbers. All of them are randomly mixed up. The default length is 15 (so you can just call `password` to generate a new password) but you can overwrite this config by passing in another number, e.g. `password 15`. The generated password will appear as part of a system notification and will be copied to the clipboard. Where: Either go to the Github project page or download the workflow from Packal Demonstration:
  5. I'm a noob and loving Alfred 2. I've imported a bunch of workflows and am wondering if they pose any security risks. Can malware, viruses or keystroke loggers be added to my system by way of an imported workflow? Are workflows safe? Does running anti-virus on them before import do any good? What precautions does Alfred 2 take to make sure that no malevolent code gets added to my mac? Thanks for the app. It's really well done!
  6. CapnAverage

    Password Generator Workflow

    Hey everyone, Just rustled up a quick workflow to generate a password of any length and automatically send it to the clipboard, with an option for your generated password to include non-alphanumeric characters in addition to alphanumeric ones or limit it to just alphanumeric characters. Whilst this not as secure a means of generating a password in comparison to tools such as 1password (as the password will be stored in the clear in the clipboard), I figured it might be useful for some of you denizens of the Alfred forums! So, for example, entering 'pwg 15' would result in a string like this: %gnf9tgTXtle5D) And, if you want a purely alphanumeric password, just hold down option when you press enter and you'll get something like this: pCwva7DJ2EMYkE2 You can specify any number of digits after 'pwg' to set the desired length of your password. Disclaimer: This workflow is for use 'as is', and I accept no responsibility for the security of any passwords that you generate via this workflow or any accounts that you secure with passwords generated via this workflow. [/legalese] Download here: Password Generator Workflow
  7. The pass password manager (http://www.passwordstore.org) is a password manager that aims to use primarily existing unix tools such as GPG and git to store and sync passwords. What attracted me to pass is that I want my passwords to sync between my phone and my computer, and I want that syncing to be free (I have used LastPass for a while, but have just been opening the mobile website whenever I needed a password—not a great solution). Pass offers that, with a standard format usable by an Android app and an iOS app. Pass has a quite good user interface for a command-line tool, including a helpful bash autocomplete. However, I spend most of my time away from the command-line, and was looking for a way that I could use it without having to open up a terminal. Enter Alfred. This is my first workflow, and it has a few rough edges, but it provides just about everything I need. Pass for Alfred provides a few simple pieces of functionality. It operates on the keyword pass as a script filter, and has several possible responses. First, if the argument is "edit", it provides autocomplete functionality to select which password in the store to edit. Second, if the argument is recognized as another different keyword, it is passed through to pass. Third, if the argument does not match one of the pass commands, it will be treated as a fuzzy search for the name of the password in the archive. If actioned, it will open a terminal, which will ask the user to enter their passphrase for the GPG key used in encrypting. If successful, it will copy the password to the clipboard. If no matches are found and the user enters another word, the workflow assumes the user is entering a command to pass, and it will be used when pass is called on the terminal. Requirements (for it to be useful): pass — easiest installed with brew install pass (brew.sh) GPG — while GPG will be installed by brew, there's a very nice graphical interface to GPG that you can get at (https://gpgtools.org) A setup and working pass environment (see man pass). For syncing, a working git remote environment. Places that need improvement: Commands such as cp and mv that use existing passwords should autocomplete those Copying to the clipboard is somewhat dangerous. Even though pass does automatically clear it after 45 seconds, clipboard history applications (such as Alfred) can hang on to it longer. Some refactoring in the code Currently only handles passwords stores found in their default location (~/.password-store) It'd be nice to automatically sync the git repository any time changes are made. It does everything I need it to, so I probably won't be touching it for a while unless it breaks. However, if you make some changes that make it work better for you, I'll be more than happy to accept pull requests! Github: https://github.com/MatthewWest/pass-alfred Direct link: Raw
  8. This is a simple workflow to generate a 32 byte salt using Python's os.urandom(). Options to output as a byte string or encoded to base-64. Repo: https://github.com/gcallsen/alfred-2-salt-generator Download Workflow Directly: https://github.com/gcallsen/alfred-2-salt-generator/raw/master/generate_salt.alfredworkflow
  9. Hi, I'm thinking about upload my alfred.Alfredpreferences folder to my Github dotfiles repo and I wanted to know which folders contains sensible data to add them to .gitignore. I know that clipboard and some workflows should be treated as sensible data but I want to know if I should add more folders to this list. Another question I have it's if this UUID contains sensible info too and what's its purpose Alfred.alfredpreferences/preferences/local/<UUID> Thanks!
  10. phantasm

    Privacy / Security

    hyper-paranoid question here- are all url/file search queries stored, even if you disable 'query history' / 'URL history' / clipboard? what if you enable these features, will the query cache be cleared once you clear those feature histories? i would like to use Alfred for all web searches instead of a browser, but if i am piping searches i would normally enter directly on HTTPS search sites, are these queries instead being recorded in plain text somewhere before they reach the HTTPS site? could queries theoretically be sent by way of scripts in imported workflows, if the developer designed it that way? and, more generally, is Alfred interacting with the network at any point, or all queries local? for someone who is privacy-minded, does using Alfred sacrifice security for convenience in any obvious ways? Thanks very much
  11. This workflow generates some useful checksums from file contents. It is implemented as file action which makes it easy to use! It works pretty nice with my "Last changed files" workflow and also can be used to checksum a file in finder by setting a hotkey to the "File Selection" in "Find File". You can download it here: https://github.com/oderwat/alfredworkflows/raw/master/Checksums.alfredworkflow My other workflows are here: https://github.com/oderwat/alfredworkflows Versions: V1.0 - Initial releases
  12. I've created a workflow for SuperGenPass available here. The Run Script action in the workflow includes comments that describe how to customize it. The included Ruby script "sgp" can also be used directly from the command line; type ./sgp --help in the workflow directory for more information.
×