Keep access data secure with Cryptonify
Data Entry
Once you have made all the adjustments, the next step is to enter the access data. First, you should create categories in Cryptonify in which you can summarize similar services. To this end, click the leftmost switch New category at the top of the program window. In a new window, Cryptonify now prompts you to specify a name for the category.
The new category will appear on the left sidebar of the main window after you click Save. Select the new category by simply clicking it, and open the window for data entry by clicking New entry at the top left of the main window. Now enter the corresponding data for the website (Figure 5); the password is not displayed in plain text. A bar displayed directly below the fields for entering the password indicates how secure the password is. If passwords are insecure, it is advisable to create a stronger one at the earliest opportunity.
You can also add more information or attach a file containing important additional data (e.g., about the relevant page) in the Other tab of the input dialog. Cryptonify encrypts this file when the entry is saved. Once you have done this, save the new entry by clicking Save. The software then displays the data in the right list view (Figure 6).
Because the collected passwords are not displayed in plain text, when you need to see one, right-click the corresponding entry on the right side of the main window in the list view. A context menu now opens from which you can select the Show password option. Cryptonify then issues the corresponding password in a separate window in very large letters.
Fully Automatic
The plugin server integrated in Cryptonify enables automatic login on indexed websites in conjunction with a corresponding browser extension. To do this, download and install the extension for the browser used via the Cryptonify settings menu; you also need to enable the plugin server. You can do both of these things in the Settings | Properties | Plugin-Server tab.
When gathering authentication data, you need to enter the exact URL containing the login dialog in the Website input field. As soon as you access one of the indexed login pages with Cryptonify launched in the browser, the extension will display that it can automatically transmit the credentials to the website. The Cryptonify icon is only on the login screen in the entry field for the user name. As soon as you click it, the extension automatically fills out the dialog; the browser loads the protected website.
If you have several access-protected accounts with the same provider and have acquired them all with the same login page in Cryptonify, you can obtain the desired access data by clicking the Cryptonify icon in the browser. A list of the individual accounts then appears, from which you can select the desired authentication. Cryptonify automatically fills the corresponding fields in the website and you only need to click the login button on the page to use the service.
When entering authentication data, Cryptonify allows optional comments (e.g., to indicate specific service characteristics for the registration). The browser extension shows a small information icon when you click the icon to the right behind the access data, so you can view the comments later, too. It indicates that a comment has been left for this provider in Cryptonify. To read the comment, click the corresponding entry twice in the main program window. The entry window then opens and displays the comment at the bottom.
Conclusions
Cryptonify puts an end to lost or forgotten access data for web services and frees you of exuberant trails of paperwork for usernames and passwords. The Java program is very well conceived and works quickly and stably. The program interface is clearly arranged and can also be operated without time-consuming training. Extensive documentation for almost every menu item eliminates ambiguities to a great extent. Thus, you no longer have any excuse to use web services with insecure access data or even using the same access data everywhere.
Infos
- Cryptonify: http://www.marcel-carle.de/software/cryptonify/ (in German)
- Oracle Java: http://java.com/en/
- Cryptonify download: ftp://ftp.linux-magazine.com/pub/listings/magazine/181
« Previous 1 2
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
So Long Neofetch and Thanks for the Info
Today is a day that every Linux user who enjoys bragging about their system(s) will mourn, as Neofetch has come to an end.
-
Ubuntu 24.04 Comes with a “Flaw"
If you're thinking you might want to upgrade from your current Ubuntu release to the latest, there's something you might want to consider before doing so.
-
Canonical Releases Ubuntu 24.04
After a brief pause because of the XZ vulnerability, Ubuntu 24.04 is now available for install.
-
Linux Servers Targeted by Akira Ransomware
A group of bad actors who have already extorted $42 million have their sights set on the Linux platform.
-
TUXEDO Computers Unveils Linux Laptop Featuring AMD Ryzen CPU
This latest release is the first laptop to include the new CPU from Ryzen and Linux preinstalled.
-
XZ Gets the All-Clear
The back door xz vulnerability has been officially reverted for Fedora 40 and versions 38 and 39 were never affected.
-
Canonical Collaborates with Qualcomm on New Venture
This new joint effort is geared toward bringing Ubuntu and Ubuntu Core to Qualcomm-powered devices.
-
Kodi 21.0 Open-Source Entertainment Hub Released
After a year of development, the award-winning Kodi cross-platform, media center software is now available with many new additions and improvements.
-
Linux Usage Increases in Two Key Areas
If market share is your thing, you'll be happy to know that Linux is on the rise in two areas that, if they keep climbing, could have serious meaning for Linux's future.
-
Vulnerability Discovered in xz Libraries
An urgent alert for Fedora 40 has been posted and users should pay attention.