RoboForm

Last updated

RoboForm
Developer(s) Siber Systems
Initial release1999;25 years ago (1999)
Operating system macOS, Windows, iOS, Android, watchOS, Wear OS
Available in30 languages
Type Password manager
License Freemium / Proprietary software
Website www.roboform.com

RoboForm is a password manager, which is a class of software that allows users to have secure, unique passwords for every website accessed. It is amongst the older password managers [1] [2] on the market, developed by US company Siber Systems, [3] distributed as a freemium product with a subscription plan, [4] available on macOS, Windows, iOS and Android [4] and as a plugin for web browsers. [5] [6]

Contents

Overview

Siber Systems is a company founded in 1995 by Vadim Maslov [7] [8] with headquarters in Fairfax, Virginia. [9] The company was founded to capitalize on research into text parsing, compilation and transformation to produce useful, commercially-viable technologies. [9] They released RoboForm as their first consumer product in 1999. [10] [11] [2]

RoboForm was initially a form-filling utility and was further developed into a full-fledged password manager, [12] then delivered with password generator, password capturer, password importer, multi-factor authentication and secure password sharing. [6]

The first business version of RoboForm was released in 2009. In 2010 it was introduced premium cross-platform subscription service for individuals and in 2015, Siber Systems launched RoboForm as a software as a service solution (SaaS). The freemium model was available starting in 2017. [5]

See also

Related Research Articles

Kerberos is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Its designers aimed it primarily at a client–server model, and it provides mutual authentication—both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks.

In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend against attacks that use precomputed tables, by vastly growing the size of table needed for a successful attack. It also helps protect passwords that occur multiple times in a database, as a new salt is used for each password instance. Additionally, salting does not place any burden on users.

The Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH) is a protocol developed for harvesting metadata descriptions of records in an archive so that services can be built using metadata from many archives. An implementation of OAI-PMH must support representing metadata in Dublin Core, but may also support additional representations.

In cryptography, a password-authenticated key agreement (PAK) method is an interactive method for two or more parties to establish cryptographic keys based on one or more party's knowledge of a password.

A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.

In software development, time-of-check to time-of-use is a class of software bugs caused by a race condition involving the checking of the state of a part of a system and the use of the results of that check.

<span class="mw-page-title-main">Network on a chip</span> Electronic communication subsystem on an integrated circuit

A network on a chip or network-on-chip is a network-based communications subsystem on an integrated circuit ("microchip"), most typically between modules in a system on a chip (SoC). The modules on the IC are typically semiconductor IP cores schematizing various functions of the computer system, and are designed to be modular in the sense of network science. The network on chip is a router-based packet switching network between SoC modules.

A password manager is a computer program that allows users to store and manage their passwords for local applications or online services such as web applications, online shops or social media. A web browser generally has a built in version of a password manager. These have been criticised frequently as many have stored the passwords in plaintext, allowing hacking attempts.

<span class="mw-page-title-main">KWallet</span> Password manager

KDE Wallet Manager (KWallet) is free and open-source password management software written in C++ for UNIX-style operating systems. KDE Wallet Manager runs on a Linux-based OS and Its main feature is storing encrypted passwords in KDE Wallets. The main feature of KDE wallet manager (KWallet) is to collect user's credentials such as passwords or IDs and encrypt them through Blowfish symmetric block cipher algorithm or GNU Privacy Guard encryption.

<span class="mw-page-title-main">UNSW School of Computer Science and Engineering</span>

The UNSW School of Computer Science and Engineering (CSE) is part of the UNSW Faculty of Engineering and was founded in 1991 out of the former Department of Computer Science within the School of Electrical Engineering and Computer Science. It is the highest ranked and largest School of its kind in Australia. The academic staff have research focus in areas such as Artificial Intelligence, Biomedical Image Computing, Data Knowledge, Embedded Systems, Networked Systems and Security, Programming Languages and Compilers, Service Oriented Computing, Theoretical Computer Science and Trustworthy Systems.

<span class="mw-page-title-main">Tamer Şahin</span> Turkish hacker (born 1981)

Tamer Şahin is a Turkish white hat hacker.

<span class="mw-page-title-main">Dashlane</span> Password manager software

Dashlane is a subscription-based password manager and digital wallet application available on macOS, Windows, iOS and Android. Dashlane uses a freemium pricing model with a subscription plan option.

<span class="mw-page-title-main">Enpass</span> Password manager

Enpass is a cross-platform offline password management app available as a freemium software with subscription plans as also with one time payment licence.

A wireless onion router is a router that uses Tor to connect securely to a network. The onion router allows the user to connect to the internet anonymously creating an anonymous connection. Tor works using an overlaid network which is free throughout the world, this overlay network is created by using numerous relay points created using volunteer which helps the user hide personal information behind layers of encrypted data like layers of an onion. Routers are being created using Raspberry Pi adding a wireless module or using its own inbuilt wireless module in the later versions.

<span class="mw-page-title-main">Bitwarden</span> Open-source password manager


Bitwarden is a freemium open-source password management service that stores sensitive information, such as website credentials, in an encrypted vault. The platform offers a variety of client applications, including a web interface, desktop applications, browser extensions, mobile apps, and a command-line interface. Bitwarden offers a free US or European cloud-hosted service as well as the ability to self-host.

<span class="mw-page-title-main">Mark Tehranipoor</span>

Mark M. Tehranipoor is an Iranian American academic researcher specializing in hardware security and trust, electronics supply chain security, IoT security, and reliable and testable VLSI design. He is the Intel Charles E. Young Preeminence Endowed Professor in Cybersecurity at the University of Florida and serves as the Director of the Florida Institute for Cybersecurity Research. Since June 2022, he has served as the chair of the Department of Electrical and Computer Engineering at the University of Florida. He is a fellow of IEEE, ACM, and NAI as well as a Golden Core member of the IEEE. He is a co-founder of the International Symposium on Hardware Oriented Security and Trust (HOST). He is the recipient of the 2023 SRC Aristotle award. Tehranipoor also serves as a co-director of the Air Force Office of Scientific Research CYAN and MEST Centers of Excellence.

<span class="mw-page-title-main">Budi Gunawan</span> Chief of Indonesian intelligence since 2016

Police-General (Ret.) Tan Sri Budi GunawanPSM is an Indonesian high ranking police officer who is the Chief of the Indonesian State Intelligence Agency (BIN) since September 9, 2016, and is also the General Chairman of the Indonesian E-Sports Executive Board. He previously served as Deputy Chief of Indonesian National Police accompanying National Police Chief Badrodin Haiti and Tito Karnavian. He is the second member of the police after Sutanto to lead the State Intelligence Agency.

The booting process of Android devices starts at the power-on of the SoC and ends at the visibility of the home screen, or special modes like recovery and fastboot. The boot process of devices that run Android is influenced by the firmware design of the SoC manufacturers.

Sherief Reda is a computer scientist and engineer. He is currently a professor at the School of Engineering and Computer Science Department, Brown University, and a principal research scientist at Amazon Supply Chain Optimization Technology team. He has been elevated to a Fellow of the IEEE for his contributions to energy-efficient and approximate computing.

References

  1. Riley, Sean (28 February 2022). "RoboForm password manager review". Tom's Guide . Retrieved 20 December 2022.
  2. 1 2 Broida, Rick (13 July 2011). "Still Awesome After All These Years: Eight Excellent Free Downloads". PCWorld . Archived from the original on 21 December 2022. Retrieved 21 December 2022.
  3. Kurland, Scott (2009). The Windough sweepstakes system. [Lexington, KY]: [CreateSpace]. p. 59. ISBN   978-1-4486-2953-4. OCLC   773291840.{{cite book}}: CS1 maint: date and year (link)
  4. 1 2 Rusen, Ciprian Adrian (2022). Windows 11 all-in-one. Hoboken, NJ. pp. 748–749. ISBN   978-1-119-85869-0. OCLC   1290211028.{{cite book}}: CS1 maint: date and year (link) CS1 maint: location missing publisher (link)
  5. 1 2 Kissell, Joe (2021). Take control of your passwords (3rd ed.). San Diego, CA. ISBN   978-1-947282-18-6. OCLC   1028639864.{{cite book}}: CS1 maint: date and year (link) CS1 maint: location missing publisher (link)
  6. 1 2 Rubenking, Neil; Key, Kim (9 February 2022). "RoboForm Everywhere Review". PC Mag . Archived from the original on 21 December 2022. Retrieved 21 December 2022.
  7. "Siber Systems Inc". The Open Database of the Corporate World. Archived from the original on 21 December 2022. Retrieved 21 December 2022.
  8. Garver, Rob (9 August 2005). "From Russia with Capital". NJBIZ. Archived from the original on 21 December 2022. Retrieved 21 December 2022.
  9. 1 2 "Should I Remove programs by Siber Systems". Should I Remove It? . Retrieved 20 December 2022.
  10. Gray, Joshua; Franqueira, Virginia N. L.; Yu, Yijun (2016). "Forensically-Sound Analysis of Security Risks of Using Local Password Managers" (PDF). 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW) (PDF). Beijing, China: IEEE. pp. 114–121. doi:10.1109/REW.2016.034. ISBN   978-1-5090-3694-3. S2CID   15971740.
  11. Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers. Bruce Christianson. Berlin: Springer. 2005. ISBN   978-3-540-31836-1. OCLC   262681819.{{cite book}}: CS1 maint: others (link)
  12. Denise Bertacchi (10 May 2022). "RoboForm Review: Form Master Turned Security Pro". Tom's Hardware . Archived from the original on 21 December 2022. Retrieved 21 December 2022.