search
HomeOperation and MaintenanceLinux Operation and MaintenanceWhat are the methods for generating random passwords in Linux?

1. Use the sha algorithm to encrypt the date and output the first 32 characters of the result:

date %s |sha256sum |base64 |head -c 32 ;echo

The generated results are as follows:

ztnimgm0ndi5ogzjmwmxndlhzmjmngm4

2. Use the embedded /dev/urandom and filter out those characters that are not commonly used in daily life . Only the first 32 characters of the result are output here:

The generated results are as follows:

pdj0xwz7exd_qb5b27bwwsm1hrf3a7cj

3. Use openssl’s random function

openssl rand - base64 32

The generated result is as follows:

ryjwqjltlayex3j7ncbir20h1k/0cnqlneunytscfko=

4. This method is similar to the previous urandom, but it It works in reverse

tr -cd '[:alnum:]'

generated The result is as follows:

tpgudzf7sqtu4yyw2lvhmuqoziqi87

5. Use the string command, which outputs a printable string from a file

strings / dev/urandom | grep -o '[[:alnum:]]' | head -n 32 | tr -d '\n'; echo

The generated results are as follows:

w4v1iqtkmq8sidd9jxdqnpg8hpmoz8

6. This is a simpler version using urandom

The generated result is as follows:

rmdlgspn_bm-izvfwz9bei0rf-jiy6gs

7. Use the very useful dd command

dd if=/dev/urandom bs=1 count=32 2>/dev/null | base64 -w 0 | rev | cut -b 2- | rev

The generated results are as follows:

9 0rud4u3hmsdmlgd7j0sf/r09mzfdvbs28w po2wca

8. You can even generate a password that can be entered with only your left hand

/urandom tr -dc '12345!@#$%qwertqwertasdfgasdfgzxcvbzxcvb' | head -c32; echo

The generated results are as follows:

vtg3 #tr4sagxg3z%##wzg4zq@gz$wdqf

9. If you use one of the above methods every time, a better way is to save it as a function. If you do this, you can generate random passwords at any time after running the command for the first time using just randpw. Maybe you can save it to your ~/.bashrc file

randpw(){

The generated results are as follows:

vgbx8cno950riykzrppya4bvbavzby_x

10. The last way to generate random passwords The method is the simplest. It can also be run under windows with cygwin installed. It can also run under mac os x. I'm sure there will be complaints that the passwords generated this way are less random than other methods. But in fact if you use all the strings it generates as the password, then the password is random enough

#date | md5sum

The generated result is as follows:

e0d057b46a9a78346cbd94b25e574e79 -
date | base64

The generated results are as follows:

##mjaxnow5tcawn acicazmeaxpsdmmj/mnj/lm5sgmtc6mda6mzygq1nucg==

ifconfig | md5sum

The generated results are as follows:

7c4243742aa515d45c12deca31428a95 -

You can even generate a nuclear bomb launch password. The following is an example of generating a long password;

ifconfig | base64

The generated results are as follows:##zw0xicagicagiexpbmsgzw5jyxa6rxrozxjuzxqgiehxywrkcia3odoyqjpdqjoyqjpcmdo5ncag

ciagicagicagicbpbmv0igfkzhi6mtkylje2oc4zljugiejjyxn 0oje5mi4xnjgumy4yntugie1h

c2s6mju1lji1ns4yntuumaogicagicagicagaw5lddygywrkcjogzmu4mdo6n2eyyjpjymzmomzl
mmi6yja5nc82ncbty29wztpmaw5rciagicagicagicbvucbcuk9brenbu1qgulvotklorybnvuxu
sunbu1qgie1uvtoxntawicbnzxryawm6mqogicagicagicagulggcgfja2v0czoymdy3nty0igvy
cm9yczowigryb3bwzwq6mcbvdmvycnvuczowigzyyw1lojakicagicagicagifryihbhy2tldhm6
odg2ndugzxjyb3jzojagzhjvchblzdowig92zxjydw5zojagy2fycmllcjowciagicagicagicbj
b2xsaxnpb25zojagdhhx dwv1zwxlbjoxmdawiagicagicagulggynl0zxm6mjazndkzntex
icgxotqumcbnauipicbuwcbiexrlczozmjuynzuxniaomzeumcbnauipcgpsbyagicagicagtglu
ayblbmnhcdpmb2nhbcbmb29wymfjayagciagicagicagicbpbmv0igfkzhi6m ti3ljaumc4xicbn
yxnroji1ns4wljaumaogicagicagicagaw5lddygywrkcjogojoxlzeyocbty29wztpib3n0ciag
icagicagicbvucbmt09qqkfdsybsvu5osu5hicbnvfu6mty0mzygie1ldhjpyzoxciagicagicag
icbswcbwywnrz xrzoju2otkzmsblcnjvcnm6mcbkcm9wcgvkojagb3zlcnj1bnm6mcbmcmftztow
ciagicagicagicbuwcbwywnrzxrzoju2otkzmsblcnjvcnm6mcbkcm9wcgvkojagb3zlcnj1bnm6
mcbjyxjyawvyojakicag icagicagignvbgxpc2lvbnm6mcb0ehf1zxvlbgvuojagciagicagicag
icbswcbiexrlczozmzezmdcxosaomzeunsbnauipicbuwcbiexrlczozmzezmdcxosaomzeunsbn
auipcgo=

The above is the detailed content of What are the methods for generating random passwords in Linux?. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:亿速云. If there is any infringement, please contact admin@php.cn delete
Understanding Linux: The Core Components DefinedUnderstanding Linux: The Core Components DefinedMay 01, 2025 am 12:19 AM

The core components of Linux include kernel, shell, file system, process management and memory management. 1) Kernel management system resources, 2) shell provides user interaction interface, 3) file system supports multiple formats, 4) Process management is implemented through system calls such as fork, and 5) memory management uses virtual memory technology.

The Building Blocks of Linux: Key Components ExplainedThe Building Blocks of Linux: Key Components ExplainedApr 30, 2025 am 12:26 AM

The core components of the Linux system include the kernel, file system, and user space. 1. The kernel manages hardware resources and provides basic services. 2. The file system is responsible for data storage and organization. 3. Run user programs and services in the user space.

Using Maintenance Mode: Troubleshooting and Repairing LinuxUsing Maintenance Mode: Troubleshooting and Repairing LinuxApr 29, 2025 am 12:28 AM

Maintenance mode is a special operating level entered in Linux systems through single-user mode or rescue mode, and is used for system maintenance and repair. 1. Enter maintenance mode and use the command "sudosystemctlisolaterscue.target". 2. In maintenance mode, you can check and repair the file system and use the command "fsck/dev/sda1". 3. Advanced usage includes resetting the root user password, mounting the file system in read and write mode and editing the password file.

Linux Maintenance Mode: Understanding the PurposeLinux Maintenance Mode: Understanding the PurposeApr 28, 2025 am 12:01 AM

Maintenance mode is used for system maintenance and repair, allowing administrators to work in a simplified environment. 1. System Repair: Repair corrupt file system and boot loader. 2. Password reset: reset the root user password. 3. Package management: Install, update or delete software packages. By modifying the GRUB configuration or entering maintenance mode with specific keys, you can safely exit after performing maintenance tasks.

Linux Operations: Networking and Network ConfigurationLinux Operations: Networking and Network ConfigurationApr 27, 2025 am 12:09 AM

Linux network configuration can be completed through the following steps: 1. Configure the network interface, use the ip command to temporarily set or edit the configuration file persistence settings. 2. Set up a static IP, suitable for devices that require a fixed IP. 3. Manage the firewall and use the iptables or firewalld tools to control network traffic.

Maintenance Mode in Linux: A System Administrator's GuideMaintenance Mode in Linux: A System Administrator's GuideApr 26, 2025 am 12:20 AM

Maintenance mode plays a key role in Linux system management, helping to repair, upgrade and configuration changes. 1. Enter maintenance mode. You can select it through the GRUB menu or use the command "sudosystemctlisolaterscue.target". 2. In maintenance mode, you can perform file system repair and system update operations. 3. Advanced usage includes tasks such as resetting the root password. 4. Common errors such as not being able to enter maintenance mode or mount the file system, can be fixed by checking the GRUB configuration and using the fsck command.

Maintenance Mode in Linux: When and Why to Use ItMaintenance Mode in Linux: When and Why to Use ItApr 25, 2025 am 12:15 AM

The timing and reasons for using Linux maintenance mode: 1) When the system starts up, 2) When performing major system updates or upgrades, 3) When performing file system maintenance. Maintenance mode provides a safe and controlled environment, ensuring operational safety and efficiency, reducing impact on users, and enhancing system security.

Linux: Essential Commands and OperationsLinux: Essential Commands and OperationsApr 24, 2025 am 12:20 AM

Indispensable commands in Linux include: 1.ls: list directory contents; 2.cd: change working directory; 3.mkdir: create a new directory; 4.rm: delete file or directory; 5.cp: copy file or directory; 6.mv: move or rename file or directory. These commands help users manage files and systems efficiently by interacting with the kernel.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Atom editor mac version download

Atom editor mac version download

The most popular open source editor

VSCode Windows 64-bit Download

VSCode Windows 64-bit Download

A free and powerful IDE editor launched by Microsoft

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment