Tux


How to Export Your Viber Chat History

Need to save a record of your Viber chats? It’s easy! Just follow these simple steps to export your messages:

  1. Open Viber on your mobile device.
  2. Go to More (usually found in the bottom-right corner).
  3. Click on Settings.
  4. Tap Calls and Messages.
  5. Select Email message history.

Alternatively, you can open this link directly from your mobile device:

viber://more/email_message_history_on

This action will allow you to save a zip file with all your conversations, which you can later share using other conventional methods.

Please note that the export file will only contain text messages and no media (photos, videos, etc.). If you need to save media, you’ll have to back those up separately.

That’s it! Your chat history will be emailed to the address you choose, and you can keep it safely stored for future reference.

An illustration for a logo that embodies a team of Cypriot ethical hackers, incorporating a sleek, modern shield with a stylized silhouette of Cyprus in the center. The shield is adorned with digital accents like a binary code halo and a keyboard pattern. The acronym 'CEH' for 'Cypriot Ethical Hackers' is boldly positioned across the shield, with a cybernetic font, set against a background that hints at a digital network.

Can’t Find Google’s App Passwords Option? Here’s How to Access It Directly

Introduction

Setting up app passwords is essential when you use applications or devices that don’t support 2-Step Verification codes. However, many users have reported difficulty finding the option to create an app password in their Google accounts, even after enabling 2-Step Verification. If you’re facing this issue, don’t worry—you can access the App Passwords page directly through a specific URL.

Why Is the App Passwords Option Missing?

Google frequently updates its interface and security settings, sometimes making features like App Passwords harder to locate. Reasons you might not see the option include:

  • Interface Changes: Google may have relocated the feature in recent updates.
  • Account Restrictions: Some account types, like business or education accounts, may have administrator restrictions.
  • Incomplete Verification Setup: If 2-Step Verification isn’t fully set up, the App Passwords option might not appear.

Direct Access to App Passwords

If the App Passwords option is elusive, you can bypass the navigation hassle by visiting the page directly:

🔗 Access App Passwords Directly

Step-by-Step Guide to Generate an App Password

  1. Visit the Direct Link: Click on the link above or enter it into your browser’s address bar.
  2. Sign In: Log in to your Google account if you’re not already signed in.
  3. Verify with 2-Step Verification: You may be prompted to complete a verification step to confirm your identity.
  4. Navigate to App Passwords: You should now be on the App Passwords page.
  5. Select the App and Device:
  • Select App: From the dropdown menu, select the app for which you’re generating the password. Select Other (Custom name) and enter a name if it’s not listed.
  • Select Device: Choose the device you’re using.
  1. Generate Password: Click Generate to create a unique app password.
  2. Use the Password: You’ll receive a 16-character password. When prompted for your Google account password, enter this into the app or device.

Tips and Considerations

  • Security: Keep your app passwords secure. Treat them like your regular passwords.
  • One-Time Use: Typically, you only need to enter the app password once per app or device.
  • Revocation: If you lose a device or no longer use an app, revoke its app password from the same App Passwords page.

Conclusion

Finding the App Passwords option can be frustrating, but accessing it directly through https://myaccount.google.com/apppasswords is a simple solution. Always ensure that your 2-Step Verification is fully set up and that you follow Google’s security recommendations to keep your account safe.

A digital vector logo for a team of Cypriot ethical hackers, featuring a stylized knight's helmet to represent the chivalry of ethical hacking. The helmet is merged with digital elements like pixels and circuit lines. The colors of the Cyprus flag are subtly integrated into the design, with a lock icon as the knight's crest to symbolize protection and cybersecurity.

Configuring YubiKey for Challenge-Response with YubiKey Manager (ykman)

YubiKeys are popular hardware security keys for multi-factor authentication, passwordless login, and cryptographic operations. YubiKey Manager (ykman) is a versatile command-line tool that helps manage YubiKeys and configure various features, such as OTP (One-Time Passwords), FIDO2, OpenPGP, and more.

In this blog, we’ll walk through installing ykman, configuring the system to support smart card (CCID) functionality, and setting up YubiKey’s OTP Challenge-Response mechanism on Slot 2 with a custom secret key.

Prerequisites

Before you proceed, ensure you have:

  • A YubiKey (any model that supports OTP)
  • A Linux-based system (although similar commands apply for macOS and Windows)
  • Administrative privileges (i.e., sudo access)

Step 1: Install YubiKey Manager (ykman)

The easiest way to install ykman is through the Snap package system. Open your terminal and run the following command:

1
sudo snap install ykman

Snap packages offer the advantage of being automatically updated, and the installation process is streamlined across different Linux distributions.

Step 2: Install PC/SC Daemon (for Smart Card Functionality)

YubiKey’s advanced features such as PIV (Personal Identity Verification), OpenPGP, and OATH require the PC/SC daemon (pcscd). This daemon handles smart card communication and is crucial if you plan to use your YubiKey as a smart card device.

To install pcscd, run the following command:

1
sudo apt-get install pcscd

Once installed, ensure that the service is running:

1
2
sudo systemctl start pcscd
sudo systemctl enable pcscd

This ensures that the PC/SC daemon starts on boot and is ready to handle YubiKey interactions that require smart card protocols.

Step 3: Configure YubiKey OTP Slot 2 for Challenge-Response

YubiKeys supports OTP in two different slots. By default, Slot 1 is often used for standard Yubico OTP, while Slot 2 can be configured for custom purposes, such as Challenge-Response.

In this example, we will configure Slot 2 with a custom secret key for Challenge-Response using HMAC-SHA1. This key can be used in scenarios such as system authentication, password managers, or other cryptographic operations.

Generate or Define a Secret Key

For Challenge-Response to work, you need a 20-byte secret key in hexadecimal format. You can either generate this key yourself or use a tool like OpenSSL:

1
openssl rand -hex 20

Ensure you securely store this secret key, as it will be used for Challenge-Response authentication.

Configure Slot 2 with the Secret Key

To configure the secret key for Challenge-Response in Slot 2, use the following ykman command. Replace the example key with your own 20-byte key:

1
ykman otp chalresp 2 00112233445566778899aabbccddeeff00112233
  • otp chalresp tells YubiKey Manager that we are configuring OTP Challenge-Response.
  • 2 indicates Slot 2.
  • The hexadecimal string 00112233445566778899aabbccddeeff00112233 is your secret key.

Once this command runs successfully, your YubiKey is ready for Challenge-Response authentication in Slot 2.

Step 4: Verify the Configuration

To ensure that the configuration was successful, you can check the YubiKey’s slot status with the following command:

1
ykman otp info

This command will display information about both Slot 1 and Slot 2, allowing you to verify that Slot 2 has been configured for Challenge-Response using HMAC-SHA1.

Conclusion

You have now successfully installed ykman, configured your system for smart card support with pcscd, and set up Slot 2 on your YubiKey for OTP Challenge-Response using a custom secret key. This setup is valuable for integrating YubiKey into secure systems, password managers, and custom cryptographic workflows.

By leveraging ykman, you unlock a wide range of features in your YubiKey, making it a powerful tool for authentication and security.

For further reading on YubiKey and its capabilities, you can explore the official Yubico documentation.

Common Issues

  1. PC/SC Not Available: If you encounter the warning PC/SC not available. Smart card (CCID) protocols will not function., ensure that the pcscd service is installed and running. You can restart it using:
1
sudo systemctl restart pcscd
  1. Permission Denied: If you experience permission issues when running ykman, ensure that your user has access to USB devices, or try running the command with sudo.

With this setup, your YubiKey is now ready to provide robust security for your systems and applications!

A Pixar-style movie poster featuring a 3D animated girl with an adventurous spirit, standing proudly on the peak of a high, rocky mountain holding the Cyprus flag. Her hair is styled in a playful, windswept manner, and her outfit reflects the colors of the flag. Next to her is a faithful companion, a large, endearing mouflon goat with detailed fur texture and expressive eyes, both looking out over the vast landscape.