Free Online Privacy Training 101
  • Online Privacy Training
  • About this online privacy training course
  • Contents
  • Introduction
    • Disclaimer
  • Modules
    • 1. Online Privacy: an introduction
      • Lesson 1: Understanding the Digital Landscape
      • Lesson 2: Privacy Policies & User Agreements
    • 2. Privacy Basics and Background
      • Lesson 1: The Public You vs. The Private You
      • Lesson 2: Dissecting Your Digital Footprint: Data and Metadata
      • Lesson 3: Tracking (Cookies, Link Tracking and Data Aggregation)
        • Part 1: Cookies
        • Part 2: Link Tracking
        • Part 3: Data Aggregation
      • Lesson 4: Proprietary vs. Open Source
    • 3. Privacy Architecture
      • Lesson 1: Privacy Architecture
      • Lesson 2: Operating System Layer
      • Lesson 3: Networking Layer
      • Lesson 4: Application Layer and Above
      • Privacy Architecture Summary
    • 4. Private Messaging with Signal Messenger
    • 5. Private Browsing
    • 6. Data Encryption, User Name and Password Management
      • Lesson 1: User Name and Password Best Practices
      • Lesson 2: USB Disk Encryption
      • Lesson 3: Password Management with KeePassX
    • 7. Virtual Private Networks (VPNs)
    • 8. Private Email
    • Summary
Powered by GitBook
On this page

Was this helpful?

  1. Modules
  2. 6. Data Encryption, User Name and Password Management

Lesson 3: Password Management with KeePassX

Lesson on password management with KeePassX, Dashlane, LastPass, Zoho Vault.

PreviousLesson 2: USB Disk EncryptionNext7. Virtual Private Networks (VPNs)

Last updated 6 years ago

Was this helpful?

Now we are going to access a fantastic example of an open source program that can help you protect some of your most important digital assets, your user name and password data. Lots of people use commercial products such as LastPass, Dashlane or Zoho Vault, but the fact that that these platforms do not publish their source code is a red flag for the truly security-minded. If the source code is not published openly, how can you really know of vulnerabilities that exist?

So without any further ado, let's dive into KeePassX!

  1. Using Tor Browser, navigate to .

  2. Download and install the appropriate package for your computer.

  3. Launch KeePassX. Tip: Hover the mouse pointer over the icons in the toolbar to review tool tips about the actions those icons perform.

  4. Select Database > Create New Database.

  5. Thinking back to lesson one in this module, enter your master password. This is the only password that you should ever have to remember again, so make sure you haven’t skipped lesson 1!

  6. Ignoring the “Key File” section, click OK at the bottom of the window.

  7. On the menu bar select Database > Save Database. Name your database and save it to a safe place on your machine.

  8. Saved user names and passwords are called “entries”. To create your first new entry, right click in the blue-and-white striped area and select Add new entry.

  9. Add the relevant information. Note: You can generate a random password key by clicking Gen.

  10. Save your entry by clicking OK at the bottom of the window.

  11. Now comes the slightly tedious bit. Find your existing user name and password list – wherever you currently have it hiding – and import every entry into KeePassX. While you are doing this, go to each account and update the passwords to be strong passwords generated by KeePassX.

  12. When you have imported all your user name and password pairs, copy your KeePassX database to your encrypted drive. Remember that every time you update your ‘master database’ on your computer, you need to make a back-up of it on your encrypted USB drive. Remember to regularly back-up!

Finished at last!

http://keepassx.org/downloads