Users' actions logging (Professional / Corporate edition only) ĭatabase and folder fields can be fully customized. Permissions can be set for folders or even individual records Ĭoncurrent write access to a database for multiple users Memory blocks are cleared when no longer needed Ībility to access passwords databases from multiple computers across the network Īdjustable user privileges per given database No unencrypted temporary files ever created Support of the following encryption algorithms (can be used together): Blowfish, 3DES, Rijndael, Tea, Cast128, RC4, Serpent, Twofish Common encryption suite, nothing hokey or proprietary. Granular security (You should be able to give your developers access to a subset of passwords)ģ. Search ability (I shouldn't have to scroll to find a password or set of keys)Ĥ. Compatibility (I shouldn't be tied to a piece of software to get the password I need)ĥ. The web based ones have 1 drawback, if the webserver is offline you have troubles but you can keep an offline copy just for these purposes.Ī good password safe should have the following charactaristics:Ģ. I have not used KeePass so it is worth a try but every single file application I have used for passwords has major drawbacks. it is much more common however with single file systems that your keystore gets corrupt, locked, or is located on the resource that is having issues. It is rare, exceedingly so, that it would be the case to go that route. I don't doubt that there are much clever systems out there, but personally when I'm in deep doodoo and trying to recover stuff I really don't want to have to fire up a LAMP or Windows/IIS box just to be able to see my passwords.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |