<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Fernando A. S. Serra</title>
    <description>The latest articles on DEV Community by Fernando A. S. Serra (@fernandosserra).</description>
    <link>https://dev.to/fernandosserra</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F845618%2F89386bd1-d2a0-458a-bd0c-d5c38a00813b.jpeg</url>
      <title>DEV Community: Fernando A. S. Serra</title>
      <link>https://dev.to/fernandosserra</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/fernandosserra"/>
    <language>en</language>
    <item>
      <title>Support Tips #2 - The importance of your toolbox</title>
      <dc:creator>Fernando A. S. Serra</dc:creator>
      <pubDate>Wed, 08 Jun 2022 12:14:08 +0000</pubDate>
      <link>https://dev.to/fernandosserra/support-tips-2-the-importance-of-your-toolbox-2hda</link>
      <guid>https://dev.to/fernandosserra/support-tips-2-the-importance-of-your-toolbox-2hda</guid>
      <description>&lt;p&gt;Photo by &lt;a href="https://unsplash.com/@ehmitrich?utm_source=unsplash&amp;amp;utm_medium=referral&amp;amp;utm_content=creditCopyText"&gt;Антон Дмитриев&lt;/a&gt; on &lt;a href="https://unsplash.com/s/photos/toolbox?utm_source=unsplash&amp;amp;utm_medium=referral&amp;amp;utm_content=creditCopyText"&gt;Unsplash&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;A few years ago, I shared an apartment in the Historic Center of São Paulo with a very dear friend. During this period his mother had some difficulty at her house and needed to spend time with us. It wasn't a problem for me, as we had agreed on things like that, about sheltering family members in difficulty or even other friends before we signed the partnership.&lt;/p&gt;

&lt;p&gt;Everything ok so far. There were no problems during her stay, we became friends, we talked a lot about many things and it was a very gratifying experience to learn from someone with more experience than me, even nowadays I have more contact with her than with him, but a thing struck me during this period and that was the reason for writing this article today.&lt;/p&gt;

&lt;p&gt;I don't remember the exact day, but I was taken by surprise when we were cleaning the apartment with a quote from her:&lt;/p&gt;

&lt;p&gt;– I don't know what you have a toolbox for if I've never seen you use it.&lt;/p&gt;

&lt;p&gt;I laughed, it was funny that she pointed this out, in fact, I hardly ever used that toolbox and only cleaned it once or twice a year, to check for rust or sometimes when I needed some pliers and remembered it existed. . At the moment I just replied:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Oh, it's there for when you need it. Better to have than not to have.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And we go on with life.&lt;/p&gt;

&lt;h2&gt;
  
  
  What do this situation and the Technology Support Sector have in common?
&lt;/h2&gt;

&lt;p&gt;All.&lt;/p&gt;

&lt;p&gt;Your toolbox doesn't need to have pliers, a hammer, a little slurry in an old mayonnaise jar, and pounds of recycled screws from things that no longer fit me, like mine. The truth is, you may not even need a physical toolbox, it may be easier to hire a professional for woodworking services or to tinker with your plumbing if you find that more convenient.&lt;/p&gt;

&lt;p&gt;But when we bring this concept of the toolbox to the technological environment, we have a slightly broader notion of the importance of having the right tools to carry out your work or your hobbies.&lt;/p&gt;

&lt;p&gt;I explain. When my friend's mother said that having a toolbox was useless for me, a guy with more PC skills than the physical disposition to sand a wall, for example, she wasn't looking further. Who has never had a problem with the shower in the middle of the night, a melted wire, or a switch that stops working and had to open it using a kitchen knife and several minutes of patience?&lt;/p&gt;

&lt;p&gt;Well, having the right tools and not needing them is much better than not having the tools and needing them. After all, as the proverb said: "It is better to be a warrior in a garden, than a gardener in a war.".&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--SP91cDFP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/13z4vwtbr1dfqc123ing.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--SP91cDFP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/13z4vwtbr1dfqc123ing.jpg" alt="Image description" width="880" height="587"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Photo by &lt;a href="https://unsplash.com/@thisisengineering?utm_source=unsplash&amp;amp;utm_medium=referral&amp;amp;utm_content=creditCopyText"&gt;ThisisEngineering&lt;/a&gt; RAEng on &lt;a href="https://unsplash.com/s/photos/technician?utm_source=unsplash&amp;amp;utm_medium=referral&amp;amp;utm_content=creditCopyText"&gt;Unsplash&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Knowledge, more knowledge and a lot of knowledge.&lt;/p&gt;

&lt;p&gt;This week, I started a new job. I was all excited and found myself thinking about this article and how I should write it, after all, the idea had been hammering in my head for a week.&lt;/p&gt;

&lt;p&gt;The new job brought bigger challenges for me, I already have a good background working in the area of support and technology, so it was not a surprise for me when some new concepts appeared in the job description and a training path was presented to me.&lt;/p&gt;

&lt;p&gt;I really liked the content and went through the paths, until at one point, one of the topics that the trail suggested was a training at Bonnie Biafore's LinkedIn Learning, on Project Management Fundamentals. I opened a wide smile, it was very nice to see it there, because about three weeks ago I had already completed this course.&lt;/p&gt;

&lt;p&gt;It just served as an example for me about how important it is for you to have the right tools in your head, nestled right there in their corner. When I took the course, I thought: "Wow, it will be a cool experience, it will add things to my curriculum and well, knowledge is not lost."&lt;/p&gt;

&lt;p&gt;But I didn't expect this knowledge to be used so quickly and especially recommended by my managers. The fact is that having the tools, or knowledge prepared in advance, saved me precious time and I was able to dedicate myself more to the specific areas of knowledge that the role requires.&lt;/p&gt;

&lt;p&gt;This also happened with my recycling in Excel, since I had completed a very fruitful and extensive trail on LinkedIn Learning (see it here again) with instructors like Karine Lago, Laennder Alves and Cristiano Galvão. I thought to myself that I didn't use Excel a lot in my daily life, but it was really good to recycle and review the concepts I learned years ago, that is, polish the tool and fight rust, get the cobwebs out of the set.&lt;/p&gt;

&lt;p&gt;It was great to have done that, because the test for the vacancy was exactly that, an Excel spreadsheet with several needs for advanced formulas and PivotTables that, to be honest, I knew how to do it, but I didn't even remember where to start before the course .&lt;/p&gt;

&lt;h2&gt;
  
  
  And what are the best tools to have in my box?
&lt;/h2&gt;

&lt;p&gt;Well, that's relative.&lt;/p&gt;

&lt;p&gt;If you work in development and are an excellent Java programmer, why not take a look at alternative languages to the model, which follow the same paradigm? You won't lose anything by learning a little Kotlin, or keeping up to date with recent advances in using the Go Language.&lt;/p&gt;

&lt;p&gt;If you are a project manager, Scrum Master or something similar, why not increase your knowledge by seeing similar cases of people in the same role, or even studying other agile management methods and taking the best of them to apply in your day-to-day tasks?&lt;/p&gt;

&lt;p&gt;It is always possible to learn something new and, even if that knowledge seems useless or unnecessary for the moment, having a brief notion about the most varied areas will be very important in some unexpected situation and maybe even give you a competitive advantage in specific points of the your career.&lt;/p&gt;

&lt;p&gt;That's all folks, I hope you liked it! See you next time.&lt;/p&gt;

</description>
      <category>career</category>
      <category>softskills</category>
      <category>learning</category>
      <category>tips</category>
    </item>
    <item>
      <title>Support Tips #1 - Digital Security Basics</title>
      <dc:creator>Fernando A. S. Serra</dc:creator>
      <pubDate>Mon, 11 Apr 2022 12:40:18 +0000</pubDate>
      <link>https://dev.to/fernandosserra/support-tips-1-digital-security-basics-cla</link>
      <guid>https://dev.to/fernandosserra/support-tips-1-digital-security-basics-cla</guid>
      <description>&lt;p&gt;Cover Photo by &lt;a href="https://unsplash.com/@flyd2069?utm_source=unsplash&amp;amp;utm_medium=referral&amp;amp;utm_content=creditCopyText"&gt;FLY:D&lt;/a&gt; on &lt;a href="https://unsplash.com/s/photos/digital-security?utm_source=unsplash&amp;amp;utm_medium=referral&amp;amp;utm_content=creditCopyText"&gt;Unsplash&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Good morning, Good Afternoon, Good Evening! I don't know the time you're gonna read this, so be greeted!&lt;/p&gt;

&lt;p&gt;Digital inclusion has given voice to almost every community in the world. We live in a wonderful era to discover new cultures and learn new things. There are several learning platforms, social networks where you can share your opinions, follow religious and community leaders, artists... The possibilities are almost infinite and if they are not infinite, they are very diverse.&lt;/p&gt;

&lt;p&gt;With the diversification of access, security flaws multiply and, like a crumb on the floor, attracts cockroaches, flaws attract SCAMMERS.&lt;/p&gt;

&lt;p&gt;This guide was designed for you, the connected person, who has doubts about security and wants to be prepared to avoid network security breaches and the headache resulting from the scams that have been reinvented more and more.&lt;/p&gt;

&lt;h2&gt; Step 1 — Do I use secure passwords? &lt;/h2&gt;

&lt;p&gt;123@password, god123, love123, john2304, StacyandBill1501… Passwords like these are all good examples of what NOT to USE.&lt;/p&gt;

&lt;p&gt;The simpler your password, the easier it is for someone to figure out your access mechanisms, and as much as service providers try to prevent your data from being compromised, it's not too difficult for a social engineering scammer to get what he wants from you with a small talk on facebook, for example.&lt;/p&gt;

&lt;p&gt;Social engineering is a technique that allows you to evaluate a person by what is important to him and what he demonstrates in conversations. A social engineer is nothing more than a person with great interpersonal skills, able to detect how you think through what you say. That way, he can “Kick” your passwords and try to access your account.&lt;/p&gt;

&lt;p&gt;Although this method is common, it is not very effective, but there are other ways to try to circumvent your password, all of them based on what you post and what you make public out there.&lt;/p&gt;

&lt;p&gt;As much as it sounds like I'm suggesting this, no, you don't have to stop posting your lunch photo, or your cat's birthday video, you just need to be a little more careful.&lt;/p&gt;

&lt;p&gt;A secure password, for example, does not need to be generated by Norton's utility or your iphone's native algorithm (although this is recommended). You can create very reliable passwords yourself with a little logic.&lt;/p&gt;

&lt;p&gt;For example, let's suppose that you, like me, have a cat named Priscilo. Priscilo has a birthday on May 3rd and as I believe in signs, I decided that he is a very stubborn Taurus. A good example of a password generated from this fact would be &lt;strong&gt;Pri03@stubborn05&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Note that in this example, we have a capital P heading the password, two numbers arranged in the body of the word, and a special symbol.&lt;/p&gt;

&lt;p&gt;It's still not ideal, but you can get an idea of ​​how a little creativity can improve your security on at least a couple of levels.&lt;/p&gt;

&lt;p&gt;Another alternative is to use password managers to generate secure passwords. One that I really like is &lt;a href="https://my.norton.com/extspa/passwordmanager?path=pwd-gen"&gt;Norton Password Generator&lt;/a&gt;, from Symantec, a well-established security company in the market, which offers this free solution for those who don't want to waste time on it.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--awFqk9xa--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/0hgo0nngor9g9wuurwvg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--awFqk9xa--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/0hgo0nngor9g9wuurwvg.png" alt="A screenshot of Symantec-Norton's online password generator" width="700" height="349"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Step 2 — Testing Password Security&lt;/h2&gt;

&lt;p&gt;How do I know if my password is secure? Well, this question is not that difficult to answer, but don't worry, you won't have to ask Karen's son, who spends all day doing "computer stuff" to try to hack your instagram. It's easier to go to &lt;a href="https://haveibeenpwned.com/"&gt;HAVE I BEEN PWNED&lt;/a&gt; and check it out.&lt;/p&gt;

&lt;p&gt;No, I'm not sending you to a strange site with dangerous words. This site belongs to an Ethical Hacking community (basically, security agents and “good” hackers) that tests your passwords and emails, to verify that they are not in leaked databases. The term PWNED is an expression used by cybersecurity professionals for dominated, or compromised, data.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--2HAfEsE_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/lui2ixq9xeuozx7la14h.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--2HAfEsE_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/lui2ixq9xeuozx7la14h.png" alt="So, were you compromised?" width="700" height="359"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I have two cases here to show what this site does. The first is an email that I know has been leaked and the second is my podcast email that I recently created. Let's see what the website tells us.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--IQkD9dGP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/26jr0tiydoh6wst515kp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--IQkD9dGP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/26jr0tiydoh6wst515kp.png" alt="Oh no… Oh no… Oh no no no no no!" width="700" height="320"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As you can see, my data has been leaked and this is terrible to know, but all is not lost. We'll talk about what can be done later. If you, however, were luckier than me and your email wasn't leaked, the site will look a lot less scary, with this face:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--OTyW0_gd--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/tuksylv39t5y1mdkqn5y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--OTyW0_gd--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/tuksylv39t5y1mdkqn5y.png" alt="Uff" width="700" height="320"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now you must be wondering, hey Fernando, you said I would be able to check my passwords, but you mentioned email. Well, that was on purpose. It's no use changing your facebook password if the hacker has access to your email. So, knowing now that your email may have been leaked, you will consider changing his password as well.&lt;br&gt;
Let's go back to passwords. In the header of that site, there is an option to check if your passwords have been leaked or not:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--vPMG_GBV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/qatmz4ftylylg27x018m.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--vPMG_GBV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/qatmz4ftylylg27x018m.png" alt="Click on Passwords, padawan" width="700" height="45"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Clicking there on &lt;strong&gt;Passwords&lt;/strong&gt;, you will see this screen here:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--aR3Il8bw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/i91gpnrr9zpzxca4r3f6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--aR3Il8bw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/i91gpnrr9zpzxca4r3f6.png" alt="Hey, let's test our passwords!" width="700" height="328"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Well, let's check our passwords. I'll start with one that I'm sure was leaked:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--iIKjSWg8--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/glova9bwd4la56vdwt8d.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--iIKjSWg8--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/glova9bwd4la56vdwt8d.png" alt="Oh no! Pwned 14 times!" width="880" height="740"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can laugh, I used to use the same password for everything, but now let's see the password we tested at the beginning of this guide: &lt;strong&gt;Pri03@stubborn05&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--fgk5m1Qs--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/mz9irik0s75rc0gqcv4v.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--fgk5m1Qs--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/mz9irik0s75rc0gqcv4v.png" alt="Very Nice, Mucho Bueno, Ueba!" width="880" height="762"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Good! Yummy like hot popcorn in butter! By the way, do you like popcorn?&lt;br&gt;
All kidding aside, this site serves as periodic prevention for your passwords, so whenever you consider reviewing your security, make sure the password you're thinking of using hasn't already been leaked.&lt;/p&gt;

&lt;h2&gt;Step 3 — I've Changed All My Passwords, But I Don't Think I'll Remember Them&lt;/h2&gt;
 

&lt;p&gt;If you're like me, running out of ideas and starting to forget things in your mid-30s, you're going to think, “Gee, now support, how do I remember this bunch of passwords? Isn't it better to use the same one everywhere to remember more easily?”.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--5TVbkUty--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dkf0bt7nqwnpdigvxfcf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--5TVbkUty--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dkf0bt7nqwnpdigvxfcf.png" alt="For the love of Our Savior Nazaré Tedesco, NO!" width="748" height="482"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Never use the same password on different websites, emails or apps. Always ensure that your passwords, especially those for emails and access to telephony and communication apps, are unique and strong.&lt;br&gt;
As remembering all these combinations can be a problem even for those who memorized the phone book, uncle recommends the Bitwarden software:&lt;/p&gt;

&lt;p&gt;Look how beautiful and free:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--xXQd9Cs_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zism3ry7s4kh7x9fhfo3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--xXQd9Cs_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zism3ry7s4kh7x9fhfo3.png" alt="BitWarden Interface" width="672" height="429"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here you will be able to store several information at once, such as trusted URLs within the Login, Password, username combo and the best, it even has a built-in secure password generator, which I will teach you how to use NOW!&lt;/p&gt;

&lt;p&gt;First, click on that pretty button, with the plus sign there:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Hiybuf38--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/hj7ma9bdi8fbmx48oulz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Hiybuf38--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/hj7ma9bdi8fbmx48oulz.png" alt="Big, no?" width="402" height="67"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Then it will open a new form on the right:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--hFtf032J--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/87g3a7yrcs13aire8npn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--hFtf032J--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/87g3a7yrcs13aire8npn.png" alt="Hey, let's register our access to facebook!" width="700" height="750"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here you can choose whether the item you want to add is a login, a credit or debit card, an identity or a secret note.&lt;br&gt;
The name is basically the title of that credential, for you to associate the password and the user with facebook, for example:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--fn-1z_Qo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/k42qkkmgikkkm4uppkw9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--fn-1z_Qo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/k42qkkmgikkkm4uppkw9.png" alt="I told Priscilo that this email was too long!" width="700" height="751"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The password, you can manually fill in with one of your choice, or you can click on those two circular arrows, to generate a new one.&lt;br&gt;
It will generate one according to the preset pattern and you can copy it for immediate use, but don't forget to click on the confirmation symbol before exiting Bitwarden:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--nUwULGgD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/li2s1aondp2dtotnpkch.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--nUwULGgD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/li2s1aondp2dtotnpkch.png" alt="Easy!" width="700" height="606"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After that, just fill in the url, if you want, to facilitate future navigation using BitWarden and click on the disk there to save:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s---NyMgqk5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3kmdnvrsi4a8f1oaz5mo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s---NyMgqk5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3kmdnvrsi4a8f1oaz5mo.png" alt="You would only need 84 floppy disks to save Bitwarden installer" width="700" height="775"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you don't know what a floppy disk is, sorry, it's that icon next to the CANCEL button.&lt;/p&gt;

&lt;p&gt;The good news is that now that you have made an account on bitwarden and saved your passwords, they will be safe under an umbrella called “MASTER PASSWORD”. This, by the way, is the only password that I recommend that you memorize and preferably write it down on paper and keep it in a drawer in your house.&lt;/p&gt;

&lt;p&gt;Another cool thing about Bitwarden is that you can install it on your desktop at home, on your work laptop and on your smartphone. It is also possible to open it in the browser, and your passwords will all be synchronized with the open instance, for you to use when you need it.&lt;/p&gt;

&lt;h2&gt;Step 4 — Two-Factor Authentication, when and how to use it?&lt;/h2&gt;

&lt;p&gt;The answer to these questions is as follows. The When, is always, the How, I will need to elaborate below.&lt;/p&gt;

&lt;p&gt;Two-factor authentication is an extra layer of protection adopted by many software companies, basically this layer works with an application that generates a numeric or alphanumeric code continuously or an email that sends a numeric or alphanumeric code whenever an access is made. your account.&lt;/p&gt;

&lt;p&gt;This also works for SMS, but this third option I strongly recommend that you don't adopt and I'll explain now why.&lt;/p&gt;

&lt;p&gt;Basically, we live in a country where 63 cell phones are stolen per hour in capital cities (Information on Brazil). With this alarming number of devices being subtracted, it is to be expected that a scammer can, for example, try to access your email, or reset your password and use a code that arrives by SMS, right? Absolutely right. This is what is done most nowadays and there are even gangs specializing in scams with pix (an agile method of bank transfer, common in Brazil) and theft of devices.&lt;/p&gt;

&lt;p&gt;Therefore, if you have SMS authentication, even if your device is locked, on some operating systems, most users leave the option of notifications on the lock screen available. With this, it is possible for them to see your code and from there, start a password reset process.&lt;/p&gt;

&lt;p&gt;To get around this loophole, I recommend that you use &lt;a href="https://www.microsoft.com/en-us/security/mobile-authenticator-app"&gt;Microsoft Authenticator&lt;/a&gt;. It is the best authenticator available on the market and in case your smartphone is removed, you can access your codes online, whether to quickly reset passwords, remove authentication or block the app on the device.&lt;/p&gt;

&lt;p&gt;While google authenticator is just as good if your phone is stolen, it doesn't provide an online solution for you to access codes or remove your old authenticator from your account, so I don't recommend using it.&lt;/p&gt;

&lt;p&gt;As well as providing a way to recover your access, Microsoft Authenticator can also help you with automatic filling of passwords, addresses and cards, being a wonderful alternative to BitWarden.&lt;/p&gt;

&lt;h2&gt;Step 5 — Biometrics and why we should be careful.&lt;/h2&gt;

&lt;p&gt;Biometrics can make your life and banking transactions much easier, but it can be a thorn in your side when it comes to theft.&lt;/p&gt;

&lt;p&gt;If your cell phone is stolen and falls into the hands of advanced users, they can register additional biometrics and with it, access their banking applications whose configuration is allowing access through this means. Therefore, I strongly recommend that you avoid using bank accesses linked to biometrics as much as possible, as comfortable as it may seem.&lt;/p&gt;

&lt;p&gt;If possible, have a cell phone with only your banking applications and other important information registered and leave on your daily use cell phone only a digital wallet app such as Paypal, Venmo, CashApp or similar. So, you can go to a more distant place, with your digital wallet card, the app and more secure that if you are robbed, not all will be lost.&lt;/p&gt;

&lt;h2&gt;That's all, folks!&lt;/h2&gt;

&lt;p&gt;If these tips were helpful to you, please like the post.&lt;/p&gt;

&lt;p&gt;The topic is vast and the post was huge, I know I could summarize the information a lot more, but well, this was written during a coffee, so reading should take the same time and you will leave here, much more informed than when you arrived !&lt;/p&gt;

&lt;p&gt;The original text was written in Portuguese and translated during another coffee, I apologize in advance for any errors and gladly accept corrections!&lt;/p&gt;

</description>
      <category>security</category>
      <category>support</category>
      <category>beginners</category>
      <category>password</category>
    </item>
  </channel>
</rss>
