Software Alternatives & Reviews

Chinese hackers at it again. It’s crazy; I’ve changed my password twice lol. They really want this account.

Recommended and mentioned products

  1. Check if your account has been compromised in a data breach

    One thing to note if it is a failed attempt, it's possible one of your other accounts using the same email may have been compromised and they are using a bot to try all the email and password combos in the list to try and find other accounts using the same email / pass. Check your email on haveibeenpwned to see if your email address shows in any known compromised lists. You can then ensure you change passwords for...
  2. Bitwarden is a free and open source password management solution for individuals, teams, and business organizations.

    freemium $10.0 / Annually (Premium)

    For online security a password manager is by far the easiest thing you can start using. I would personally recommend Bitwarden as it's opensource, self-hostable, and it's free plan has more than enough features for the average user. To make the transition easier just start changing passwords as you sign into accounts and always try to use the longest most complicated password possible unless you'll likely need to...
  3. Business-grade cybersecurity for home users

  4. Syncthing replaces proprietary sync and cloud services with something open, trustworthy and...

  5. KeePass Cross-Platform Community Edition - A community maintained fork of the popular KeePassX...

  6. Authenticator is a simple, free, and open source two-factor authentication app.

    For iOS? Authenticator - it's open-source and about as simple as it gets.
  7. AbuseIPDB is an IP address blacklist for webmasters and sysadmins to report IP addresses engaging in abusive behavior on their networks, or check the report history of any IP.

    These are the kind of IPs that tries to bruteforce my SSH everyday, go checkout abuseipdb, they are from all over the world, either infected devices or proxy servers.
  8. Best rated Two-Factor Authentication smartphone app for consumers, simplest 2fa Rest API for developers and a strong authentication platform for the enterprise.

    That's why you use Authy instead of Google Authenticator. Lost your phone? All you need is your phone number and a password and everything is back!