 #  User - Log Bad Passwords 

 

- - Joomla! 3
    - Joomla! 4
    - Joomla! 5
    - Joomla! 6

- [ plugin ](/content-tags/plugin)
- [ user ](/content-tags/user)
- [ Joomla! 5 ](/content-tags/joomla-5)
- [ Security ](/content-tags/security)
 
  ![User - Log Bad Passwords](https://cdn.richeyweb.com/images/articles/plg_user_logbadpasswords/user-log-bad-passwords.webp)    - [JED: User - Log Bad Passwords](https://extensions.joomla.org/index.php?option=com_jed&view=extension&layout=default&id=3962&Itemid=145)
 


Discover a unique security tool for Joomla with "User - Log Bad Passwords," a reimagined plugin designed to help administrators track and manage weak or previously failed password attempts. Originally released as a package of two plugins for earlier Joomla versions, this re-release consolidates that functionality into a single, streamlined plugin—simplifying installation while retaining the same powerful features.

## How It Works

Inspired by a personal revelation about password tracking, I created this plugin to empower Joomla administrators with insights by creating an extension to log bad passwords, mirroring capabilities like those Google might use. When users enter incorrect passwords, "User - Log Bad Passwords" logs them—storing only failed attempts in clear text (not a security risk since they’re known bad passwords) when that user makes a successful login attempt. If a user later adopts a logged bad password, it’s automatically cleared from the list, ensuring continuous protection.

The log appears exclusively on the user edit screen in the Joomla administrator backend, nowhere else, giving admins full control. You can configure the plugin to track bad passwords for frontend logins, backend logins, or exclude specific user groups, tailoring its scope to your needs. Installation and setup are straightforward: install the single plugin, then configure where it runs and which groups to exclude.

## Ethical Considerations and Use Cases

Is this plugin unethical? That depends on its application. For a support representative on a private intranet site, it’s a valuable tool for identifying weak passwords and improving security. However, using it on public-facing sites raises ethical questions, as it could expose passwords users might reuse elsewhere. I released it as a warning, not an invitation to compromise accounts—please keep ethical opinions out of reviews, as I’m simply highlighting a possibility. If you’re concerned a site uses this plugin, check for /plugins/user/logbadpasswords/logbadpasswords.xml; if you see XML, it’s installed.

## Why Choose User - Log Bad Passwords?

This plugin isn’t for every site, but for controlled environments like private intranets, it’s a game-changer. It’s an experiment in secure password monitoring, built with care, and now simpler than ever with its single-plugin re-release. Use it responsibly to enhance security, but weigh the risks carefully for public sites.

## Features

- Streamlined Single Plugin: Combines previous dual-plugin functionality into one installer for easier use.
- Bad Password Logging: Tracks failed password attempts, clearing them if reused, visible only in the admin user edit screen.
- Flexible Configuration: Set to monitor frontend, backend, or exclude specific user groups.
- Ethical Awareness: Designed for controlled, private use—exercise caution on public sites.
 
Are you looking for the Joomla 3 version? You can find it here: [Log Bad Passwords for Joomla 3](/software/joomla/packages/log-bad-passwords)

## Download

[  User - Log Bad Passwords 5.0.33080](/extension-repository/user-log-bad-passwords/plg_user_logbadpasswords-5.0.3)

[  Report a Bug](/bugs) [  Documentation](/software/documentation/log-bad-passwords)

## Frequently Asked Questions:

What is the "User - Log Bad Passwords" plugin?It’s a Joomla plugin designed to help administrators track and log failed password attempts by users. It consolidates features from an earlier dual-plugin package into a single, streamlined plugin, making it easier to install and use while enhancing security monitoring in controlled environments.



How does the plugin work?When a user enters an incorrect password, the plugin logs it in clear text as a "bad password." These logs are stored only for failed attempts and are cleared if the user later adopts one of those passwords successfully. The log is visible exclusively on the user edit screen in the Joomla administrator backend.



Where can I see the logged bad passwords?The logged bad passwords appear only in the Joomla administrator backend, specifically on the user edit screen for the relevant user. They are not displayed anywhere else in the system.



Is it safe to store failed passwords in clear text?Yes, it’s not a security risk because only failed password attempts are logged—passwords that are already known to be incorrect. Successful passwords are never stored, and if a previously failed password becomes a user’s new password, it’s automatically removed from the log.



Can I customize how the plugin tracks passwords?Yes, the plugin is flexible. You can configure it to monitor failed password attempts for frontend logins, backend logins, or both. You can also exclude specific user groups from being tracked, tailoring it to your site’s needs.



How do I install and set up the plugin?Installation is simple: download the single plugin file, install it via Joomla’s extension manager, and then configure it in the plugin settings. You can specify where it runs (frontend, backend, or both) and which user groups to exclude.



Is this plugin ethical to use?It depends on the context. In private, controlled environments like an intranet, it’s a useful tool for improving security by identifying weak passwords. On public-facing sites, however, it could raise ethical concerns if users reuse passwords elsewhere, as it logs failed attempts. The developer encourages responsible use and warns against compromising user trust.



How can I tell if a Joomla site is using this plugin?You can check for the plugin’s presence by looking for the file /plugins/user/logbadpasswords/logbadpasswords.xml in the site’s directory. If this XML file exists, the plugin is installed.



What are the main use cases for this plugin?It’s ideal for private intranets or controlled Joomla environments where administrators want to monitor and improve password security. For example, a support representative could use it to identify users with consistently weak password choices and provide guidance.



Why was the plugin re-released as a single plugin?The original version came as a package of two plugins, but the re-release combines all functionality into one installer. This simplifies the setup process while retaining the same powerful features, making it more user-friendly.



Should I use this plugin on a public website?The developer advises caution when using it on public sites due to potential ethical concerns. It’s best suited for private or controlled environments where security monitoring outweighs privacy risks.



What happens if a user reuses a previously failed password?If a user successfully sets a password that was previously logged as a failed attempt, the plugin automatically clears that password from the bad password log, ensuring the list remains relevant and secure.



Is there a version for Joomla 3?Yes, if you need the plugin for Joomla 3, you can find it at the link provided in the article: Log Bad Passwords for Joomla 3.



What makes this plugin different from other security tools?Unlike many security tools that focus on blocking attacks or encrypting data, this plugin proactively logs failed password attempts to help admins understand user behavior and strengthen security policies. Its unique focus is on insight rather than prevention alone.



Who should avoid using this plugin?Administrators of public-facing Joomla sites with diverse users should weigh the risks carefully, as logging failed passwords could inadvertently expose patterns that users repeat on other platforms. It’s not recommended for sites where privacy is a higher priority than security monitoring.





## 4 Reviews

### Retrieved from JED monthly

#### Complete - Unfiltered

###  Works great and I use it.

#### 2012-04-07 - orasis

This is a very nice plugin with great philosophy. Great support also by the author. I trust whatever is done by Michael Richey. Thank you for this work.

 

###  Unethical

#### 2013-12-23 - Sal

I tried this plugin, and it works as described. The problem I have with it, is it also records bad passwords that are one character off. Even ones with a typo. For example, if my password was 'superman', but I typed it in as 'spuerman'. that would be recorded, and very simple for administrators to obtain actaul passwords. Just as explained in the description, "easily gain access to other accounts and services." I would be leary about any website using this plugin. Sadly, there is no way to know which ones are using it.

#### Reply

1\. Unethical is a matter of opinion. Would you rather I didn't release it, and you didn't know that such a thing was possible? I released it so everyone would know that it is possible. 2. There are valid, ethical uses for this extension. Intranet site support comes to mind. 3. I suggest in the description that this shouldn't be run on public sites. 4. You CAN determine if it's installed on a site (you cannot, however, know if it's enabled and running). Re-read the description. Thank you for at least acknowledging that it works as described. I suppose the rest of your comment is just you lashing out at me for having opened your eyes. Would you rather have remained naive?

 

###  Interesting

#### 2018-02-04 - jan Dankers

Functionality  
In works great no problem installing is simpleEase Of Use  
Simple strait forward installationSupport  
Not neededDocumentation  
Simple but not more needed 

###  love this extension

#### 2023-06-05 - Samy

Functionality  
this extension do what's described. It can do it's job as described.Ease Of Use  
very easy to use, no need to be a technical user to use this extensionSupport  
as long as I use it, I don't need support.   
It's very easy to use, even by common userDocumentation  
clear enough documentation.  
After install, go to plugin setting, only little setting needed, it's very easy to use 

 





 



- [      email ](mailto:?subject=User+-+Log+Bad+Passwords&body=https%3A%2F%2Fwww.richeyweb.com%2Fsoftware%2Fjoomla%2Fplugins%2Fuser-log-bad-passwords)
- [      facebook ](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.richeyweb.com%2Fsoftware%2Fjoomla%2Fplugins%2Fuser-log-bad-passwords)
- [      x-twitter ](https://twitter.com/intent/tweet?text=User+-+Log+Bad+Passwords%3A+https%3A%2F%2Fwww.richeyweb.com%2Fsoftware%2Fjoomla%2Fplugins%2Fuser-log-bad-passwords)
- [      linkedin ](http://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.richeyweb.com%2Fsoftware%2Fjoomla%2Fplugins%2Fuser-log-bad-passwords&title=User+-+Log+Bad+Passwords&summary=Discover+a+unique+security+tool+for+Joomla+with+%22U...)
- [      pinterest ](http://pinterest.com/pin/create/button/?url=https%3A%2F%2Fwww.richeyweb.com%2Fsoftware%2Fjoomla%2Fplugins%2Fuser-log-bad-passwords&media=https%3A%2F%2Fcdn.joomla.org%2Fimages%2Fjoomla-org-og.jpg&description=User+-+Log+Bad+Passwords)
 


 

   [  Previous article: Authentication - Email   Authentication - Email ](/software/joomla/plugins/authentication-email)  

##### We Value Your Privacy

 

We use cookies to enhance your experience and for traffic analysis. By continuing to visit this site you agree to our use of cookies.

[Privacy Policy](/privacy-policy)

 Details 

###### Google Tag Manager Items

- Ad Storage
- Ad User Data
- Ad Personalization
- Analytics Storage
- Functionality Storage
- Personalization Storage
- Security Storage
 
 

 

 

 

 

 Decline Accept
```json
{"@context":"https://schema.org","@graph":[{"@type":"Organization","@id":"https://www.richeyweb.com/#organization","name":"RicheyWeb","url":"https://www.richeyweb.com/","logo":{"@type":"ImageObject","url":"https://www.richeyweb.com/images/logo/richeyweb.svg","contentUrl":"https://www.richeyweb.com/images/logo/richeyweb.svg","width":{"@type":"QuantitativeValue","value":38,"unitCode":"PX"},"height":{"@type":"QuantitativeValue","value":38,"unitCode":"PX"},"@id":"https://www.richeyweb.com/#logo"},"image":{"@id":"https://www.richeyweb.com/#logo"},"sameAs":["https://x.com/ComRicheyweb","https://www.facebook.com/RicheyWebDev/","https://www.youtube.com/channel/UCxnVG8BwOvQRO7hVqNX7T2g","https://community.joomla.org/service-providers-directory/listings/115:richeyweb.html"],"description":"RicheyWeb is a custom software developer specializing in Joomla extensions.","ContactPoint":[{"@type":"ContactPoint","url":"https://www.richeyweb.com/contact-us","telephone":"903-873-8460","contactType":"Owner/Administrator","areaServed":["United States",{"@type":"Country","name":"United States","sameAs":["https://en.wikipedia.org/wiki/United_States","https://www.wikidata.org/wiki/Q30","https://g.co/kg/m/09c7w0"]},"European Union",{"@type":"AdministrativeArea","name":"European Union","sameAs":["https://en.wikipedia.org/wiki/European_Union","https://www.wikidata.org/wiki/Q458","https://g.co/kg/m/0_6t_z8"]},"United Kingdom",{"@type":"Country","name":"United Kingdom","sameAs":["https://en.wikipedia.org/wiki/United_Kingdom","https://www.wikidata.org/wiki/Q145","https://g.co/kg/m/07ssc"]},"Australia",{"@type":"Country","name":"Australia","sameAs":["https://en.wikipedia.org/wiki/Australia","https://www.wikidata.org/wiki/Q408","https://g.co/kg/m/0chghy"]},"Canada",{"@type":"Country","name":"Canada","sameAs":["https://en.wikipedia.org/wiki/Canada","https://www.wikidata.org/wiki/Q16","https://g.co/kg/m/0d060g"]},"Russia",{"@type":"Country","name":"Russia","sameAs":["https://en.wikipedia.org/wiki/Russia","https://www.wikidata.org/wiki/Q159","https://g.co/kg/m/06bnz"]},"China",{"@type":"Country","name":"China","sameAs":["https://en.wikipedia.org/wiki/China","https://www.wikidata.org/wiki/Q148","https://g.co/kg/m/0d05w3"]}],"availableLanguage":"en"},{"@type":"ContactPoint","url":"https://www.richeyweb.com/bugs","telephone":"903-873-8460","contactType":"Technical Support","areaServed":["United States",{"@type":"Country","name":"United States","sameAs":["https://en.wikipedia.org/wiki/United_States","https://www.wikidata.org/wiki/Q30","https://g.co/kg/m/09c7w0"]},"European Union",{"@type":"AdministrativeArea","name":"European Union","sameAs":["https://en.wikipedia.org/wiki/European_Union","https://www.wikidata.org/wiki/Q458","https://g.co/kg/m/0_6t_z8"]},"United Kingdom",{"@type":"Country","name":"United Kingdom","sameAs":["https://en.wikipedia.org/wiki/United_Kingdom","https://www.wikidata.org/wiki/Q145","https://g.co/kg/m/07ssc"]},"Australia",{"@type":"Country","name":"Australia","sameAs":["https://en.wikipedia.org/wiki/Australia","https://www.wikidata.org/wiki/Q408","https://g.co/kg/m/0chghy"]},"Canada",{"@type":"Country","name":"Canada","sameAs":["https://en.wikipedia.org/wiki/Canada","https://www.wikidata.org/wiki/Q16","https://g.co/kg/m/0d060g"]},"Russia",{"@type":"Country","name":"Russia","sameAs":["https://en.wikipedia.org/wiki/Russia","https://www.wikidata.org/wiki/Q159","https://g.co/kg/m/06bnz"]},"China",{"@type":"Country","name":"China","sameAs":["https://en.wikipedia.org/wiki/China","https://www.wikidata.org/wiki/Q148","https://g.co/kg/m/0d05w3"]}],"availableLanguage":"en"}],"knowsAbout":["Computer programming",{"@type":"Thing","name":"Computer programming","sameAs":["https://en.wikipedia.org/wiki/Computer_programming","https://www.wikidata.org/wiki/Q80006","https://g.co/kg/m/01mf_"]},"PHP",{"@type":"Thing","name":"PHP","sameAs":["https://en.wikipedia.org/wiki/PHP","https://www.wikidata.org/wiki/Q59","https://g.co/kg/m/060kv"]},"JavaScript",{"@type":"Thing","name":"JavaScript","sameAs":["https://en.wikipedia.org/wiki/JavaScript","https://www.wikidata.org/wiki/Q2005","https://g.co/kg/m/02p97"]},"arduino","Computer forensics",{"@type":"Thing","name":"Computer forensics","sameAs":["https://en.wikipedia.org/wiki/Computer_forensics","https://www.wikidata.org/wiki/Q878553","https://g.co/kg/m/02wxbd"]},"White hat",{"@type":"Thing","name":"White hat","sameAs":["https://en.wikipedia.org/wiki/White_hat_(computer_security)","https://www.wikidata.org/wiki/Q7995625","https://g.co/kg/m/03ns_5"]},"Search engine optimization",{"@type":"Thing","name":"Search engine optimization","sameAs":["https://en.wikipedia.org/wiki/Search_engine_optimization","https://www.wikidata.org/wiki/Q180711","https://g.co/kg/m/019qb_"]},"Search engine marketing",{"@type":"Thing","name":"Search engine marketing","sameAs":["https://en.wikipedia.org/wiki/Search_engine_marketing","https://www.wikidata.org/wiki/Q846132","https://g.co/kg/m/06mw8r"]},"Digital marketing",{"@type":"Thing","name":"Digital marketing","sameAs":["https://en.wikipedia.org/wiki/Digital_marketing","https://www.wikidata.org/wiki/Q1323528","https://g.co/kg/g/122hcnps"]},"Web hosting service",{"@type":"Thing","name":"Web hosting service","sameAs":["https://en.wikipedia.org/wiki/Web_hosting_service","https://www.wikidata.org/wiki/Q5892272","https://g.co/kg/m/014pz4"]},"Email hosting service",{"@type":"Thing","name":"Email hosting service","sameAs":["https://en.wikipedia.org/wiki/Email_hosting_service","https://www.wikidata.org/wiki/Q5368818","https://g.co/kg/m/09w60m"]},"Internet hosting service",{"@type":"Thing","name":"Internet hosting service","sameAs":["https://en.wikipedia.org/wiki/Internet_hosting_service","https://www.wikidata.org/wiki/Q1210425","https://g.co/kg/m/09w5yw"]},"Virtual hosting",{"@type":"Thing","name":"Virtual hosting","sameAs":["https://en.wikipedia.org/wiki/Virtual_hosting","https://www.wikidata.org/wiki/Q588365","https://g.co/kg/m/024mvh"]},"Web performance",{"@type":"Thing","name":"Web performance","sameAs":["https://en.wikipedia.org/wiki/Web_performance","https://www.wikidata.org/wiki/Q7978612","https://g.co/kg/m/0gfj3f1"]},"Web content management system",{"@type":"Thing","name":"Web content management system","sameAs":["https://en.wikipedia.org/wiki/Web_content_management_system","https://www.wikidata.org/wiki/Q45211","https://g.co/kg/m/0615s2"]},"Content management system",{"@type":"Thing","name":"Content management system","sameAs":["https://en.wikipedia.org/wiki/Content_management_system","https://www.wikidata.org/wiki/Q131093","https://g.co/kg/m/0k23c"]},"General Data Protection Regulation",{"@type":"Thing","name":"General Data Protection Regulation","sameAs":["https://en.wikipedia.org/wiki/General_Data_Protection_Regulation","https://www.wikidata.org/wiki/Q1172506","https://g.co/kg/m/0pk_7xs"]},"SERP",{"@type":"Thing","name":"SERP","sameAs":["https://en.wikipedia.org/wiki/SERP","https://www.wikidata.org/wiki/Q2205811","https://g.co/kg/g/11c5szp7kc"]},"Artificial intelligence",{"@type":"Thing","name":"Artificial intelligence","sameAs":["https://en.wikipedia.org/wiki/Artificial_intelligence","https://www.wikidata.org/wiki/Q11660","https://g.co/kg/m/0mkz"]},"Prompt engineering",{"@type":"Thing","name":"Prompt engineering","sameAs":["https://en.wikipedia.org/wiki/Prompt_engineering","https://www.wikidata.org/wiki/Q108941486","https://g.co/kg/g/11p6kpgt_n"]},"E-learning",{"@type":"Thing","name":"E-learning","sameAs":["https://en.wikipedia.org/wiki/E-learning_(theory)","https://www.wikidata.org/wiki/Q182250","https://g.co/kg/g/122czm1f"]},"Sharable Content Object Reference Model",{"@type":"Thing","name":"Sharable Content Object Reference Model","sameAs":["https://en.wikipedia.org/wiki/Sharable_Content_Object_Reference_Model","https://www.wikidata.org/wiki/Q827811","https://g.co/kg/m/06_40"]},"Experience API",{"@type":"Thing","name":"Experience API","sameAs":["https://en.wikipedia.org/wiki/Experience_API","https://www.wikidata.org/wiki/Q7807728","https://g.co/kg/g/1yw9ktxr8"]},"Joomla",{"@type":"Thing","name":"Joomla","sameAs":["https://en.wikipedia.org/wiki/Joomla","https://www.wikidata.org/wiki/Q13167","https://g.co/kg/m/07qb81"]},"Nginx",{"@type":"Thing","name":"Nginx","sameAs":["https://en.wikipedia.org/wiki/Nginx","https://www.wikidata.org/wiki/Q306144","https://g.co/kg/m/02qft91"]},"MySQL",{"@type":"Thing","name":"MySQL","sameAs":["https://en.wikipedia.org/wiki/MySQL","https://www.wikidata.org/wiki/Q850","https://g.co/kg/m/04y3k"]}],"areaServed":["United States",{"@type":"Country","name":"United States","sameAs":["https://en.wikipedia.org/wiki/United_States","https://www.wikidata.org/wiki/Q30","https://g.co/kg/m/09c7w0"]},"European Union",{"@type":"AdministrativeArea","name":"European Union","sameAs":["https://en.wikipedia.org/wiki/European_Union","https://www.wikidata.org/wiki/Q458","https://g.co/kg/m/0_6t_z8"]},"United Kingdom",{"@type":"Country","name":"United Kingdom","sameAs":["https://en.wikipedia.org/wiki/United_Kingdom","https://www.wikidata.org/wiki/Q145","https://g.co/kg/m/07ssc"]},"Australia",{"@type":"Country","name":"Australia","sameAs":["https://en.wikipedia.org/wiki/Australia","https://www.wikidata.org/wiki/Q408","https://g.co/kg/m/0chghy"]},"Canada",{"@type":"Country","name":"Canada","sameAs":["https://en.wikipedia.org/wiki/Canada","https://www.wikidata.org/wiki/Q16","https://g.co/kg/m/0d060g"]},"Russia",{"@type":"Country","name":"Russia","sameAs":["https://en.wikipedia.org/wiki/Russia","https://www.wikidata.org/wiki/Q159","https://g.co/kg/m/06bnz"]},"China",{"@type":"Country","name":"China","sameAs":["https://en.wikipedia.org/wiki/China","https://www.wikidata.org/wiki/Q148","https://g.co/kg/m/0d05w3"]}],"memberOf":["Mensa International",{"@type":"Organization","name":"Mensa International","sameAs":["https://en.wikipedia.org/wiki/Mensa_International","https://www.wikidata.org/wiki/Q184194","https://g.co/kg/m/0140pf"]},"National Rifle Association",{"@type":"Organization","name":"National Rifle Association","sameAs":["https://en.wikipedia.org/wiki/National_Rifle_Association","https://www.wikidata.org/wiki/Q863259","https://g.co/kg/m/0j6f9"]},"CompTIA",{"@type":"Organization","name":"CompTIA","sameAs":["https://en.wikipedia.org/wiki/CompTIA","https://www.wikidata.org/wiki/Q597534","https://g.co/kg/m/040shq"]},"ISFCE LLC",{"@type":"Organization","name":"ISFCE LLC","sameAs":["https://isfce.com","https://g.co/kg/g/11wxm5r0rg"]}],"hasCredential":[{"@type":"EducationalOccupationalCredential","name":"Joomla 3 Certified Administrator","credentialCategory":"Certification","description":"Administrator Exam is the first available Joomla! certification exam","recognizedBy":{"@type":"Organization","name":"Open Source Matters, Inc.","sameAs":["https://en.wikipedia.org/wiki/Open_Source_Matters,_Inc.","https://g.co/kg/g/11f00wvjhz"]},"url":"https://certification.joomla.org/certified-user-directory/michael-richey","about":["Content management system",{"@type":"Thing","name":"Content management system","sameAs":["https://en.wikipedia.org/wiki/Content_management_system","https://www.wikidata.org/wiki/Q131093","https://g.co/kg/m/0k23c"]},"Web content management system",{"@type":"Thing","name":"Web content management system","sameAs":["https://en.wikipedia.org/wiki/Web_content_management_system","https://www.wikidata.org/wiki/Q45211","https://g.co/kg/m/0615s2"]},"Joomla",{"@type":"Thing","name":"Joomla","sameAs":["https://en.wikipedia.org/wiki/Joomla","https://www.wikidata.org/wiki/Q13167","https://g.co/kg/m/07qb81"]}],"educationalLevel":"expert","image":{"@type":"ImageObject","url":"https://www.richeyweb.com/images/contact/badge.webp","contentUrl":"https://www.richeyweb.com/images/contact/badge.webp","width":{"@type":"QuantitativeValue","value":300,"unitCode":"PX"},"height":{"@type":"QuantitativeValue","value":86,"unitCode":"PX"},"caption":"Joomla 3 Certified Administrator"}},{"@type":"EducationalOccupationalCredential","name":"Certified Computer Examiner","credentialCategory":"Certification","description":"Internationally recognized computer forensics certifiecation","recognizedBy":{"@type":"Organization","name":"ISFCE LLC","sameAs":["https://en.wikipedia.org/wiki/ISFCE_LLC","https://g.co/kg/g/11wxm5r0rg"]},"url":"https://isfce.com/","about":["Digital forensics",{"@type":"Thing","name":"Digital forensics","sameAs":["https://en.wikipedia.org/wiki/Digital_forensics","https://www.wikidata.org/wiki/Q3246940","https://g.co/kg/m/0cnxzfx"]},"Computer forensics",{"@type":"Thing","name":"Computer forensics","sameAs":["https://en.wikipedia.org/wiki/Computer_forensics","https://www.wikidata.org/wiki/Q878553","https://g.co/kg/m/02wxbd"]},"Mobile device forensics",{"@type":"Thing","name":"Mobile device forensics","sameAs":["https://en.wikipedia.org/wiki/Mobile_device_forensics","https://www.wikidata.org/wiki/Q6887097","https://g.co/kg/m/06zp3tp"]},"Network forensics",{"@type":"Thing","name":"Network forensics","sameAs":["https://en.wikipedia.org/wiki/Network_forensics","https://www.wikidata.org/wiki/Q7001032","https://g.co/kg/m/05pb280"]},"Database forensics",{"@type":"Thing","name":"Database forensics","sameAs":["https://en.wikipedia.org/wiki/Database_forensics","https://www.wikidata.org/wiki/Q5227405","https://g.co/kg/m/0cgqsy"]}],"educationalLevel":"expert","image":{"@type":"ImageObject","url":"https://www.richeyweb.com/images/contact/isfce-cce.webp","contentUrl":"https://www.richeyweb.com/images/contact/isfce-cce.webp","width":{"@type":"QuantitativeValue","value":150,"unitCode":"PX"},"height":{"@type":"QuantitativeValue","value":150,"unitCode":"PX"},"caption":"Certified Computer Examiner"}}],"hasOfferCatalog":{"@type":"OfferCatalog","name":"Web Services","itemListElement":[{"@type":"Offer","itemOffered":{"@type":"Service","name":"Hosting"}},{"@type":"Offer","itemOffered":{"@type":"Service","name":"Development"}},{"@type":"Offer","itemOffered":{"@type":"Service","name":"Search Engine Optimization"}}]}},{"@type":"WebSite","@id":"https://www.richeyweb.com/#website","url":"https://www.richeyweb.com/","name":"RicheyWeb","publisher":{"@id":"https://www.richeyweb.com/#organization"},"potentialAction":{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://www.richeyweb.com/search?q={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string","valueMaxLength":256,"valueMinLength":2,"valuePattern":"^[A-Za-z0-9\\s]+$"}},"creator":{"@id":"https://www.richeyweb.com/#organization"},"copyrightHolder":{"@id":"https://www.richeyweb.com/#organization"}},{"@type":"WebPage","@id":"https://www.richeyweb.com/software/joomla/plugins/user-log-bad-passwords#webpage","url":"https://www.richeyweb.com/software/joomla/plugins/user-log-bad-passwords","name":"User - Log Bad Passwords","description":"Secure Joomla with User - Log Bad Passwords! Track weak login attempts, configure flexibly—private use only proof of concept. Download now!","isPartOf":{"@id":"https://www.richeyweb.com/#website"},"about":{"@id":"https://www.richeyweb.com/#organization"},"inLanguage":"en-GB"},{"@type":"SoftwareApplication","name":"User - Log Bad Passwords","operatingSystem":"Joomla!","applicationCategory":"Joomla Extension","aggregateRating":{"@type":"AggregateRating","ratingValue":"4","bestRating":"5","ratingCount":"4"},"offers":{"@type":"Offer","priceCurrency":"USD"},"about":["Content management system",{"@type":"Thing","name":"Content management system","sameAs":["https://en.wikipedia.org/wiki/Content_management_system","https://www.wikidata.org/wiki/Q131093","https://g.co/kg/m/0k23c"]},"Joomla",{"@type":"Thing","name":"Joomla","sameAs":["https://en.wikipedia.org/wiki/Joomla","https://www.wikidata.org/wiki/Q13167","https://g.co/kg/m/07qb81"]},"Plug-in",{"@type":"Thing","name":"Plug-in","sameAs":["https://en.wikipedia.org/wiki/Plug-in_(computing)","https://www.wikidata.org/wiki/Q3906765","https://g.co/kg/m/05x35"]},"Computer security",{"@type":"Thing","name":"Computer security","sameAs":["https://en.wikipedia.org/wiki/Computer_security","https://www.wikidata.org/wiki/Q3510521","https://g.co/kg/m/022x_"]}],"mentions":["Password",{"@type":"Thing","name":"Password","sameAs":["https://en.wikipedia.org/wiki/Password","https://www.wikidata.org/wiki/Q161157","https://g.co/kg/m/0626t"]},"Authentication",{"@type":"Thing","name":"Authentication","sameAs":["https://en.wikipedia.org/wiki/Authentication","https://www.wikidata.org/wiki/Q212108","https://g.co/kg/m/0cw7p"]},"Google",{"@type":"Organization","name":"Google","sameAs":["https://en.wikipedia.org/wiki/Google","https://www.wikidata.org/wiki/Q95","https://g.co/kg/m/045c7b"]}],"@id":"https://www.richeyweb.com/software/joomla/plugins/user-log-bad-passwords/#softwareapplication","isPartOf":{"@id":"https://www.richeyweb.com/software/joomla/plugins/user-log-bad-passwords#webpage"}}]}
```
