Week 4: Password Managers

Password Managers If you reuse passwords, your security is an illusion. The reality: Billions of passwords leak every year. When smallforum.com gets hacked, attackers try those leaked passwords on Gmail, banks, and every major service. If you reused that password, your accounts are compromised. The average person has 100+ online accounts. You cannot remember 100 unique, strong passwords. You need a password manager. This week, you’ll set up a password manager—software that generates and stores unique passwords for every account. You’ll never reuse a password again. ...

January 5, 2026 · 10 min · Cypherpunk School

Week 5: SSH Deep Dive & Secure Shell

🎯 Goal Master SSH for secure remote access, authentication hardening, port forwarding, and tunneling. Learn to configure SSH servers securely, use key-based authentication, and leverage SSH tunnels for accessing internal networks. 1. SSH Fundamentals & Key-Based Authentication Why SSH Keys Over Passwords? Passwords are weak: Vulnerable to brute force attacks Can be keylogged or phished Easily forgotten or reused SSH keys are strong: 4096-bit RSA or ed25519 provide cryptographic security Private key never leaves your machine Cannot be brute forced in reasonable time Generate an SSH Key Pair Recommended: Ed25519 (modern, fast, secure) ...

October 14, 2025 · 7 min · Cypherpunk School