And if they are SSD's...
-sc
From: Michael B. Smith [mailto:mich...@smithcons.com]
Sent: Thursday, February 10, 2011 4:17 PM
To: NT System Admin Issues
Subject: RE: IPhone attack reveals passwords in six minutes
It isn't impressive.
I've got 250 GB of Rainbow Tables. I am surely
Admin Issues
Subject: RE: IPhone attack reveals passwords in six minutes
Sounds impressive. Mind telling us what software you are using?
Murray
From: Michael B. Smith [mailto:mich...@smithcons.com]
Sent: Thursday, February 10, 2011 3:09 PM
To: NT System Admin Issues
need to logon to a non-Windows system where the
credentials are synchronised. Etc.
Cheers
Ken
From: Crawford, Scott [mailto:crawfo...@evangel.edu]
Sent: Friday, 11 February 2011 3:58 PM
To: NT System Admin Issues
Subject: RE: IPhone attack reveals passwords in six minutes
What character set
Schaefer [k...@adopenstatic.com]
Sent: Friday, February 11, 2011 2:03 AM
To: NT System Admin Issues
Subject: RE: IPhone attack reveals passwords in six minutes
Pass-the-hash is only useful /if/ you have a system that also accepts the same
hash. You still need to derive the original password if you want
:* Friday, 11 February 2011 5:17 AM
*To:* NT System Admin Issues
*Subject:* RE: IPhone attack reveals passwords in six minutes
It isn’t impressive.
I’ve got 250 GB of Rainbow Tables. I am surely not the only one.
Regards,
Michael B. Smith
Consultant and Exchange MVP
http
]
*Sent:* Thursday, February 10, 2011 3:08 PM
*To:* NT System Admin Issues
*Subject:* RE: IPhone attack reveals passwords in six minutes
Anything under 15 characters I can crack in under 5 minutes.
Anything.
Regards,
Michael B. Smith
Consultant and Exchange MVP
http
Admin Issues
Subject: RE: IPhone attack reveals passwords in six minutes
Point taken.
Why can't everyone just be honest so we can do away with passwords all
together? ;) Not to go off topic...(which means I'm about to)...but it's
staggering how many resources are spent combating
dishonesty
, 2011 2:40 AM
To: NT System Admin Issues
Subject: RE: IPhone attack reveals passwords in six minutes
We've been giving people laptops for years. They typically have even more data
on them than phones. Why aren't you railing against that?
Cheers
Ken
-Original Message-
From: Ziots, Edward
Engineer
Lifespan Organization
Email:ezi...@lifespan.org
Cell:401-639-3505
-Original Message-
From: Ken Schaefer [mailto:k...@adopenstatic.com]
Sent: Friday, February 11, 2011 2:40 AM
To: NT System Admin Issues
Subject: RE: IPhone attack reveals passwords in six minutes
We've been
On Thu, Feb 10, 2011 at 1:49 PM, David Lum david@nwea.org wrote:
One method is to take acronyms from your favorite hobby and string them
together ...
This is a valid and good technique for generating a longer password.
However, one must remain aware that human language is has **VERY
On Fri, Feb 11, 2011 at 2:57 AM, Crawford, Scott crawfo...@evangel.edu wrote:
What character set are you looking at here? Assuming the 256 ASCII chars ...
There aren't 256 ASCII characters. ASCII is a 7-bit code, some of
the characters are unprintable, and the printable control characters
are
On Fri, Feb 11, 2011 at 2:57 AM, Crawford, Scott crawfo...@evangel.edu wrote:
[1] I did some research on this way back when. See this link for an
overview. If you'd like the zip file referenced, I can get you a copy.
http://www.sysopt.com/tutorials/article.php/3532756
P.S.: Cracking tools
: Friday, February 11, 2011 5:09 AM
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
Um... That's not exactly how rainbow tables work. They're not simply a full
list of the hashes of every possible password, although that is certainly one
inefficient way to go
]
Sent: Friday, February 11, 2011 9:02 AM
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
On Fri, Feb 11, 2011 at 2:57 AM, Crawford, Scott crawfo...@evangel.edu wrote:
What character set are you looking at here? Assuming the 256 ASCII chars ...
There aren't
February 2011 6:58 PM
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
I think that this came up because we were at the physical access part of the
discussion.
There continues to be hope for those who managed to keep physical security
intact...
ASB (Find me
On Fri, Feb 11, 2011 at 9:22 PM, Ken Schaefer k...@adopenstatic.com wrote:
I’m still kinda confused. The post way back at the beginning of the thread
is talking about device encryption. Typically whole disk encryption doesn’t
use a 15 character password – but rather a somewhat longer encryption
Um wow.
On Thu, Feb 10, 2011 at 11:40 AM, David Lum david@nwea.org wrote:
What I don’t know is if this phone OS is any worse than anything else in
use. Anyone care to comment?:
“Among passwords that could be revealed were those for Google Mail as an MS
Exchange account, other MS
two words.
remote wipe.
Yep, big security issue, but if someone has physical control of your
device, any device, you should always consider it compromised.
@THIS STATMENT IS VERIFIABLY INCORRECT
On Thu, Feb 10, 2011 at 08:40, David Lum david@nwea.org wrote:
What I don’t know is if
Yeh but remember if you hook and android up to an PC, you can access their
passwords even easier than that.
You have to have physical access to the device and physical access to any
device means you can pretty much access anything any way, unless encrypted,
and as far as I am aware no phone has a
On Thu, Feb 10, 2011 at 11:40 AM, David Lum david@nwea.org wrote:
What I don’t know is if this phone OS is any worse than anything else in
use. Anyone care to comment?:
From TFA:
... requires possession of the phone ...
Okay, so, first rule of computer security is, if someone else has
On Thu, Feb 10, 2011 at 12:10 PM, S Powell powe...@gmail.com wrote:
Yep, big security issue, but if someone has physical control of your
device, any device, you should always consider it compromised.
If data is encrypted with strong crypto, and that crypto's secret
key is not stored on the
Not having used an iPhone, but if the SIM was removed from the device, would
that not disable the ability to perform a remote wipe?
-Original Message-
From: S Powell [mailto:powe...@gmail.com]
Sent: 10 February 2011 17:10
To: NT System Admin Issues
Subject: Re: IPhone attack reveals
Subject: Re: IPhone attack reveals passwords in six minutes
two words.
remote wipe.
Yep, big security issue, but if someone has physical control of your device,
any device, you should always consider it compromised.
@THIS STATMENT IS VERIFIABLY INCORRECT
On Thu, Feb 10, 2011 at 08:40
been compromised in 5 minutes)
-Original Message-
From: S Powell [mailto:powe...@gmail.com]
Sent: 10 February 2011 17:10
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
two words.
remote wipe.
Yep, big security issue, but if someone has
Issues
[mailto:ntsysadmin@lyris.sunbelt-software.com]
Sent: Thu, 10 Feb 2011
09:17:29 -0800
Subject: Re: IPhone attack reveals passwords in six minutes
On Thu, Feb 10, 2011 at 12:10 PM, S Powell powe...@gmail.com wrote:
Yep, big security issue, but if someone has physical control of your
device
?
-Original Message-
From: S Powell [mailto:powe...@gmail.com]
Sent: 10 February 2011 17:10
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
two words.
remote wipe.
Yep, big security issue, but if someone has physical control of your
device, any
All BB traffic is encrypted by default.
From: William Robbins [mailto:dangerw...@gmail.com]
Sent: Thursday, February 10, 2011 9:31 AM
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
The big if on Berry's is Encryption has to be turned
[mailto:dangerw...@gmail.com]
*Sent:* Thursday, February 10, 2011 9:31 AM
*To:* NT System Admin Issues
*Subject:* Re: IPhone attack reveals passwords in six minutes
The big *if *on Berry's is Encryption has to be turned on. :)
- WJR
On Thu, Feb 10, 2011 at 11:25, Paul Hutchings
-software.comSubject: RE: IPhone attack reveals
passwords in six minutes
All BB traffic is encrypted by default.
From: William Robbins [mailto:dangerw...@gmail.com]
Sent: Thursday, February 10, 2011 9:31 AM
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
You are correct. The device is not encrypted. Just the traffic.
From: William Robbins [mailto:dangerw...@gmail.com]
Sent: Thursday, February 10, 2011 9:34 AM
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
But that's just net traffic to and fro
*Subject:* Re: IPhone attack reveals passwords in six minutes
But that's just net traffic to and fro correct? I thought we were
discussing encryption on the device itself, which is not on by default.
- WJR
On Thu, Feb 10, 2011 at 11:32, Martin Blackstone mblackst...@gmail.com
wrote:
All BB
wipe?
-Original Message-
From: S Powell [mailto:powe...@gmail.com]
Sent: 10 February 2011 17:10
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
two words.
remote wipe.
Yep, big security issue, but if someone has physical control of your
Oh of course, let's assume corporate so set by BES policy etc.
From: William Robbins [mailto:dangerw...@gmail.com]
Sent: 10 February 2011 17:31
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
The big if on Berry's is Encryption has to be turned
, but if the SIM was removed from the device,
would that not disable the ability to perform a remote wipe?
-Original Message-
From: S Powell [mailto:powe...@gmail.com]
Sent: 10 February 2011 17:10
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
two
, 10 Feb 2011
09:17:29 -0800
Subject: Re: IPhone attack reveals passwords in six minutes
On Thu, Feb 10, 2011 at 12:10 PM, S Powell powe...@gmail.com wrote:
Yep, big security issue, but if someone has physical control of your
device, any device, you should always consider it compromised
On Thu, Feb 10, 2011 at 12:31 PM, Matthew W. Ross
mr...@ephrataschools.org wrote:
If data is encrypted with strong crypto, and that crypto's secret
key is not stored on the device, then that data can generally be
considered safe even if the device is stolen.
In English, that means if the
I must not be human... Most of my high security accounts have passwords of
20+ random characters and I have them memorized...
On Thu, Feb 10, 2011 at 10:25 AM, Ben Scott mailvor...@gmail.com wrote:
On Thu, Feb 10, 2011 at 12:31 PM, Matthew W. Ross
mr...@ephrataschools.org wrote:
If data
acronym's.
My $0.02
Dave
From: Don Ely [mailto:don@gmail.com]
Sent: Thursday, February 10, 2011 10:29 AM
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
I must not be human... Most of my high security accounts have passwords of 20+
random characters and I
you
go to a website that gives you something dumb like 12character maximum, in
which case use the hobby acronym’s.
My $0.02
Dave
*From:* Don Ely [mailto:don@gmail.com]
*Sent:* Thursday, February 10, 2011 10:29 AM
*To:* NT System Admin Issues
*Subject:* Re: IPhone attack reveals
[mailto:mblackst...@gmail.com]
Sent: Thursday, February 10, 2011 12:36 PM
To: NT System Admin Issues
Subject: RE: IPhone attack reveals passwords in six minutes
You are correct. The device is not encrypted. Just the traffic.
From: William Robbins [mailto:dangerw...@gmail.com]
Sent: Thursday, February
://www.rolandschorr.com/
b...@rolandschorr.com mailto:b...@rolandschorr.com
From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Thursday, February 10, 2011 12:07
To: NT System Admin Issues
Subject: RE: IPhone attack reveals passwords in six minutes
This is why you expect company
[mailto:powe...@gmail.com]
Sent: Thursday, February 10, 2011 12:10 PM
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
two words.
remote wipe.
Yep, big security issue, but if someone has physical control of your
device, any device, you should always consider
Engineer
Lifespan Organization
Email:ezi...@lifespan.org
Cell:401-639-3505
-Original Message-
From: Matthew W. Ross [mailto:mr...@ephrataschools.org]
Sent: Thursday, February 10, 2011 12:31 PM
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
If data
Powell [mailto:powe...@gmail.com]
Sent: Thursday, February 10, 2011 12:10 PM
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
two words.
remote wipe.
Yep, big security issue, but if someone has physical control of your
device, any device, you should always
: RE: IPhone attack reveals passwords in six minutes
No doubt, but the PHBs want their shiny toys.
Security is like insurance. Everybody thinks they have too much of it until
they discover they have too little.
Ben M. Schorr
Chief Executive Officer
Powell [mailto:powe...@gmail.com]
Sent: Thursday, February 10, 2011 12:10 PM
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
two words.
remote wipe.
Yep, big security issue, but if someone has physical control of your
device, any device, you should always
Issues ntsysadmin@lyris.sunbelt-software.com
Sent: Thu Feb 10 14:33:23 2011
Subject: RE: IPhone attack reveals passwords in six minutes
John, but you know how much users, follow directions, =0, we been in
this game far too long to know better. Its basically trying to stop
stupid, but even trying
Lifespan Organization
Email:ezi...@lifespan.org
Cell:401-639-3505
-Original Message-
From: John Cook [mailto:john.c...@pfsf.org]
Sent: Thursday, February 10, 2011 2:41 PM
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
We all know you can't solve stupid
Cook [mailto:john.c...@pfsf.org]
Sent: Thursday, February 10, 2011 2:41 PM
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
We all know you can't solve stupid! That being said I can document that
I told them to follow the protocol, my a$$ get's covered
...@gmail.com]
Sent: Thursday, February 10, 2011 2:53 PM
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
Just out of personal curiosity, have you been able to do that with any
success? I'm X number of levels below the CIO, who is levels below the
CEO. When
System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
Just out of personal curiosity, have you been able to do that with any
success? I'm X number of levels below the CIO, who is levels below the CEO.
When these requests for shiny devices come from on high
I dont see shock value in this. The same could be said for just about
anything that you have local access to.
In this case, the iPhone is running an OS that Apple is spreading to more
and more of thier device platforms (most recently the Apple TV 2;, which is
widening the interest level of
Here's something even scarier:
http://www.cellebrite.com/forensic-products.html
I have the closest thing to a remedy for the issue that David raised,
and possibly the above: GFE
Which doesn't mean GirlFriend Experience, but instead Good For Enterprise.
http://good.com
There are other vendors
I'm a recent, and satisfied user/admin, too.
On Thu, Feb 10, 2011 at 3:31 PM, Kurt Buff kurt.b...@gmail.com wrote:
Here's something even scarier:
http://www.cellebrite.com/forensic-products.html
I have the closest thing to a remedy for the issue that David raised,
and possibly the above:
Subject: Re: IPhone attack reveals passwords in six minutes
I must not be human... Most of my high security accounts have passwords of
20+ random characters and I have them memorized...
On Thu, Feb 10, 2011 at 10:25 AM, Ben Scott mailvor...@gmail.com wrote:
On Thu, Feb 10, 2011 at 12:31 PM
System Admin Issues
*Subject:* Re: IPhone attack reveals passwords in six minutes
+1 I use song lyrics also.
- WJR
On Thu, Feb 10, 2011 at 12:49, David Lum david@nwea.org wrote:
One method is to take acronyms from your favorite hobby and string them
together Example: NetBEUI CPU
10, 2011 12:52 PM
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
+1 I use song lyrics also.
- WJR
On Thu, Feb 10, 2011 at 12:49, David Lum
david@nwea.orgmailto:david@nwea.org wrote:
One method is to take acronyms from your favorite hobby and string
in under 5 minutes.
Anything.
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
From: MMF [mailto:mmfree...@ameritech.net]
Sent: Thursday, February 10, 2011 4:05 PM
To: NT System Admin Issues
Subject: RE: IPhone attack reveals passwords in six minutes
How
Issues
Subject: Re: IPhone attack reveals passwords in six minutes
I got the idea for song lyrics that way. Place I did some side work for had
the admin password as ThaawTsoM! (The hills are alive with The sound of
Music!) ((Hopefully I didn't just put that in folks heads! ;) ))
- WJR
On Thu
Sounds impressive. Mind telling us what software you are using?
Murray
_
From: Michael B. Smith [mailto:mich...@smithcons.com]
Sent: Thursday, February 10, 2011 3:09 PM
To: NT System Admin Issues
Subject: RE: IPhone attack reveals passwords in six minutes
Anything under 15
: RE: IPhone attack reveals passwords in six minutes
Sounds impressive. Mind telling us what software you are using?
Murray
From: Michael B. Smith [mailto:mich...@smithcons.com]
Sent: Thursday, February 10, 2011 3:09 PM
To: NT System Admin Issues
Subject: RE: IPhone
Hours if not days.
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
From: Jonathan [mailto:ncm...@gmail.com]
Sent: Thursday, February 10, 2011 4:13 PM
To: NT System Admin Issues
Subject: Re: RE: IPhone attack reveals passwords in six minutes
And how many
--
*From:* William Robbins [mailto:dangerw...@gmail.com]
*Sent:* Thursday, February 10, 2011 12:52 PM
*To:* NT System Admin Issues
*Subject:* Re: IPhone attack reveals passwords in six minutes
+1 I use song lyrics also.
- WJR
On Thu, Feb 10, 2011 at 12:49, David Lum david
and Exchange MVP
http://TheEssentialExchange.com http://theessentialexchange.com/
*From:* MMF [mailto:mmfree...@ameritech.net]
*Sent:* Thursday, February 10, 2011 4:15 PM
*To:* NT System Admin Issues
*Subject:* RE: IPhone attack reveals passwords in six minutes
Sounds impressive. Mind telling
A former boss liked Jumping Jack Flash is a gas, gas, gas. Or, JJFiaGGG. :-)
From: William Robbins [mailto:dangerw...@gmail.com]
Sent: Thursday, February 10, 2011 4:07 PM
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
I got the idea for song lyrics
://TheEssentialExchange.com http://theessentialexchange.com/
From: MMF [mailto:mmfree...@ameritech.net]
Sent: Thursday, February 10, 2011 4:05 PM
To: NT System Admin Issues
Subject: RE: IPhone attack reveals passwords in six minutes
How about a nursery rhyme but use the first letter of each word. Example
a month.
*From:* William Robbins [mailto:dangerw...@gmail.com]
*Sent:* Thursday, February 10, 2011 3:07 PM
*To:* NT System Admin Issues
*Subject:* Re: IPhone attack reveals passwords in six minutes
I got the idea for song lyrics that way. Place I did some side work for
had the admin
://TheEssentialExchange.com http://theessentialexchange.com/
*From:* MMF [mailto:mmfree...@ameritech.net]
*Sent:* Thursday, February 10, 2011 4:15 PM
*To:* NT System Admin Issues
*Subject:* RE: IPhone attack reveals passwords in six minutes
Sounds impressive. Mind telling us what software you are using
, February 10, 2011 4:07 PM
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
I got the idea for song lyrics that way. Place I did some side work for
had
the admin password as ThaawTsoM! (The hills are alive with The sound of
Music!) ((Hopefully I didn't
Ttttt
Wrong. :-P
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
From: Don Ely [mailto:don@gmail.com]
Sent: Thursday, February 10, 2011 4:23 PM
To: NT System Admin Issues
Subject: Re: RE: IPhone attack reveals passwords in six minutes
. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.comhttp://theessentialexchange.com/
From: MMF [mailto:mmfree...@ameritech.netmailto:mmfree...@ameritech.net]
Sent: Thursday, February 10, 2011 4:15 PM
To: NT System Admin Issues
Subject: RE: IPhone attack reveals passwords in six minutes
letter of each word. Example:
Hickory Dickery Dock The Mouse Ran Up The Clock would be: hddtmrutc.
Murray
From: William Robbins [mailto:dangerw...@gmail.com]
Sent: Thursday, February 10, 2011 12:52 PM
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
://TheEssentialExchange.com
From: MMF [mailto:mmfree...@ameritech.net]
Sent: Thursday, February 10, 2011 4:15 PM
To: NT System Admin Issues
Subject: RE: IPhone attack reveals passwords in six minutes
Sounds impressive. Mind telling us what software you are using?
Murray
Ibibirrbykibibirrbykibibrrb
From: Michael B. Smith [mailto:mich...@smithcons.com]
Sent: Thursday, February 10, 2011 3:28 PM
To: NT System Admin Issues
Subject: RE: RE: IPhone attack reveals passwords in six minutes
Ttttt
Wrong. :-P
Regards,
Michael B. Smith
Consultant
minutes.
Anything.
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
From: MMF [mailto:mmfree...@ameritech.net]
Sent: Thursday, February 10, 2011 4:05 PM
To: NT System Admin Issues
Subject: RE: IPhone attack reveals passwords in six minutes
Funny, my one of my current passwords is 16 characters...
From: Michael B. Smith [mailto:mich...@smithcons.com]
Sent: Thursday, February 10, 2011 1:29 PM
To: NT System Admin Issues
Subject: RE: IPhone attack reveals passwords in six minutes
That's why I said 15 char or less...
Regards,
Michael
://TheEssentialExchange.com http://theessentialexchange.com/
*From:* Don Ely [mailto:don@gmail.com]
*Sent:* Thursday, February 10, 2011 4:23 PM
*To:* NT System Admin Issues
*Subject:* Re: RE: IPhone attack reveals passwords in six minutes
At roughly 3 characters per minute, you can extrapolate that out
:* RE: RE: IPhone attack reveals passwords in six minutes
Ttttt
Wrong. :-P
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com http://theessentialexchange.com/
*From:* Don Ely [mailto:don@gmail.com]
*Sent:* Thursday, February 10
: RE: IPhone attack reveals passwords in six minutes
Funny, my one of my current passwords is 16 characters...
From: Michael B. Smith [mailto:mich...@smithcons.com]
Sent: Thursday, February 10, 2011 1:29 PM
To: NT System Admin Issues
Subject: RE: IPhone attack reveals passwords in six minutes
With an asymptote.
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
From: Don Ely [mailto:don@gmail.com]
Sent: Thursday, February 10, 2011 4:38 PM
To: NT System Admin Issues
Subject: Re: RE: IPhone attack reveals passwords in six minutes
Oh right, I
I'm bad, I'm bad, I'm really really bad. You know I'm bad, I'm bad... :)
From: Don Ely [mailto:don@gmail.com]
Sent: Thursday, February 10, 2011 3:39 PM
To: NT System Admin Issues
Subject: Re: RE: IPhone attack reveals passwords in six minutes
That might take awhile to crack :P
On Thu
: Michael B. Smith [mailto:mich...@smithcons.com]
Sent: Thursday, February 10, 2011 1:40 PM
To: NT System Admin Issues
Subject: RE: IPhone attack reveals passwords in six minutes
Well, the next iteration of RTs will include 16 chars - so, it's time to extend
it. :)
Regards,
Michael B. Smith
new mission at NWEA – get the other DA’s to quit being DA’s on their
normal accounts…
Dave
*From:* Michael B. Smith [mailto:mich...@smithcons.com]
*Sent:* Thursday, February 10, 2011 1:40 PM
*To:* NT System Admin Issues
*Subject:* RE: IPhone attack reveals passwords in six minutes
Consultant and Exchange MVP
http://TheEssentialExchange.com http://theessentialexchange.com/
*From:* MMF [mailto:mmfree...@ameritech.net]
*Sent:* Thursday, February 10, 2011 4:15 PM
*To:* NT System Admin Issues
*Subject:* RE: IPhone attack reveals passwords in six minutes
Sounds
: RE: IPhone attack reveals passwords in six minutes
Anything under 15 characters I can crack in under 5 minutes.
Anything.
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.comhttp://theessentialexchange.com/
From: MMF [mailto:mmfree...@ameritech.netmailto:mmfree
Now, now I thought the MIB frowned on admission of your other worldly
origin.
Jon
On Thu, Feb 10, 2011 at 1:29 PM, Don Ely don@gmail.com wrote:
I must not be human... Most of my high security accounts have passwords of
20+ random characters and I have them memorized...
On Thu, Feb 10,
://TheEssentialExchange.com http://theessentialexchange.com/
*From:* Micheal Espinola Jr [mailto:michealespin...@gmail.com]
*Sent:* Thursday, February 10, 2011 5:32 PM
*To:* NT System Admin Issues
*Subject:* Re: IPhone attack reveals passwords in six minutes
Surely. But I'm assuming we
Subject: RE: IPhone attack reveals passwords in six minutes
Anything under 15 characters I can crack in under 5 minutes.
Anything.
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.comhttp://theessentialexchange.com/
From: MMF [mailto:mmfree
Espinola Jr [mailto:michealespin...@gmail.com]
*Sent:* Thursday, February 10, 2011 6:37 PM
*To:* NT System Admin Issues
*Subject:* Re: IPhone attack reveals passwords in six minutes
Actually, I accidentally limited my remark a bit... How's about American
ASCII table?
--
ME2
://TheEssentialExchange.com
From: MMF [mailto:mmfree...@ameritech.net]
Sent: Thursday, February 10, 2011 4:05 PM
To: NT System Admin Issues
Subject: RE: IPhone attack reveals passwords in six minutes
How about a nursery rhyme but use the first letter of each word.
Example
to quit being DA’s on their
normal accounts…
Dave
From: Michael B. Smith [mailto:mich...@smithcons.com]
Sent: Thursday, February 10, 2011 1:40 PM
To: NT System Admin Issues
Subject: RE: IPhone attack reveals passwords in six minutes
Well, the next iteration of RTs will include 16 chars
Subject: RE: IPhone attack reveals passwords in six minutes
Two more words, NO Battery = NO remote Wipe, therefore dispense with that
fallacy that its going to save you, because it doesn't do a secure wipe of the
drive itself, which allows an attacker with the phone to basically hook it up
Subject: RE: IPhone attack reveals passwords in six minutes
Anything under 15 characters I can crack in under 5 minutes.
Anything.
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
From: MMF [mailto:mmfree...@ameritech.net]
Sent: Thursday, February 10, 2011
93 matches
Mail list logo