Hahahahahahahaha Jonathan A+, MCSA, MCSE
Thumb-typed from my HTC Droid Incredible (and yes, it really is) on the Verizon network. Please excuse brevity and any misspellings. On Aug 12, 2011 4:54 PM, "Sam Cayze" <[email protected]> wrote: > You know what is neat? If you type your password in this forum, it > automatically is changed to asterisks! > > Cool, try it. > > See, here is mine: > ******************* > > Now you try! > > -----Original Message----- > From: Terry Dickson [mailto:[email protected]] > Sent: Friday, August 12, 2011 2:24 PM > To: NT System Admin Issues > Subject: RE: Almost, but not quite OT: Passwords > > Now you are all entering you real current Password right? Hmmm..how long > until you are hacked because the collected those Passwords? > > -----Original Message----- > From: [email protected] [mailto:[email protected]] > Sent: Friday, August 12, 2011 2:19 PM > To: NT System Admin Issues > Subject: Re: Almost, but not quite OT: Passwords > > A good brute force attack doesn't throw passwords out for authentication - > just gets the hashed passwords and checks them against hashed values, AFAIK. > Therefore account lockouts are not triggered. > > > Sent from my POS BlackBerry wireless device, which may wipe itself at any > moment > > ________________________________ > > From: "Ben Schorr" <[email protected]> > Date: Fri, 12 Aug 2011 09:15:39 -1000 > To: NT System Admin Issues<[email protected]> > ReplyTo: "NT System Admin Issues" <[email protected]> > Subject: RE: Almost, but not quite OT: Passwords > > > Length is more important than complexity, no doubt. While it's good to have > mixed case and numbers and symbols the fact that you COULD is enough to > force any brute force attack to check for it. > > > > And, frankly, any system that will allow 1,000 passwords a second to be > thrown at it without locking the account or alerting an admin has a serious > problem. > > > > Ben M. Schorr > > Roland Schorr & Tower > > www.rolandschorr.com | www.officeforlawyers.com | Twitter: @bschorr > > > > From: andy [mailto:[email protected]] > Sent: Friday, August 12, 2011 12:00 > To: NT System Admin Issues > Subject: RE: Almost, but not quite OT: Passwords > > > > huh.. just tried something similar to one of my passwords, all lowercase, > all letters, of course my real password has a couple of numbers in it. > > 780 quintillion years > > 20 character password all lowercase - 97billion years 11character password > all lowercase 314 years huh... the password -- 0987654321aaaaaa -1 billion > years aaaaaaaaaaaa - 12 years to hack > > so much for the password rules. > > then again my password would not work on a unix system. Are unix systems > still only 8 characters. > it looks like any 8 character password can be hacked in less than a week. > > > At 11:00 AM 8/11/2011, Kennedy, Jim wrote: > > > > Good point, I just got phished. > > From: Gary Slinger [ mailto:[email protected] > <mailto:[email protected]> ] > Sent: Thursday, August 11, 2011 10:57 AM > To: NT System Admin Issues > Subject: Re: Almost, but not quite OT: Passwords > > It wasn't one of my current 'real' passwords. I'm not putting one of those > in on a site I don't know. > > ________________________________ > > From: "Kennedy, Jim" <[email protected]> > Date: Thu, 11 Aug 2011 10:46:08 -0400 > To: NT System Admin Issues<[email protected]> > ReplyTo: "NT System Admin Issues" <[email protected]> > Subject: RE: Almost, but not quite OT: Passwords > > Buwhahahah.... 124 thousand years. > > From: Gary Slinger [ mailto:[email protected] > <mailto:[email protected]> ] > Sent: Thursday, August 11, 2011 10:45 AM > To: NT System Admin Issues > Subject: Re: Almost, but not quite OT: Passwords > > With one special character, 15 years. Without it, 4 days. Interesting. > > ________________________________ > > From: "Martin Blackstone" <[email protected]> > Date: Thu, 11 Aug 2011 07:19:59 -0700 > To: NT System Admin Issues< [email protected] > <mailto:[email protected]> > > ReplyTo: "NT System Admin Issues" < [email protected] > <mailto:[email protected]> > > Subject: RE: Almost, but not quite OT: Passwords > > I got one year. > > From: Shauna Hensala [ mailto:[email protected] <mailto:[email protected]> ] > Sent: Thursday, August 11, 2011 7:16 AM > To: NT System Admin Issues > Subject: RE: Almost, but not quite OT: Passwords > > Have your users go here: http://www.howsecureismypassword.net/ > and enter their password to see how long it would take to crack. A fun > little exercise. > > Description: Red roseShauna Hensala > > ________________________________ > > From: [email protected] > To: [email protected] > Subject: RE: Almost, but not quite OT: Passwords > Date: Thu, 11 Aug 2011 13:43:08 +0000 > I changed my bed linens at the beginning of each semester whether they > needed changing or not. J > > > Carl Webster > Consultant and Citrix Technology Professional http://www.CarlWebster.com > <http://www.carlwebster.com/> > > > From: Crawford, Scott [ mailto:[email protected] > <mailto:[email protected]> ] > Sent: Thursday, August 11, 2011 8:32 AM > To: NT System Admin Issues > Subject: RE: Almost, but not quite OT: Passwords > > nice. > > Reminds me of an old roommate, "I clean the shower every six months whether > it needs it or not." > > Sent from my Palm Pre on the Now Network from Sprint > > > ________________________________ > > On Aug 11, 2011 7:42 AM, Webster <[email protected] > wrote: > I change my passwords religiously every 7 years. > > Carl Webster > Consultant and Citrix Technology Professional http://www.CarlWebster.com > <http://www.carlwebster.com/> > > > From: Gasper, Rick [ mailto:[email protected] > <mailto:[email protected]> ] > Subject: RE: Almost, but not quite OT: Passwords > > Crap...I now have to change my password again... > > From: Jon Harris [ mailto:[email protected] <mailto:[email protected]> ] > Subject: Re: Almost, but not quite OT: Passwords > > If the in-house team ever got a round to it both could be kept happy but > using something like "Horses like 2 fly, like bugs like to be stepped on!" > Complex and easy to remember. How long would that take for a brute force > attack or a dictionary attack to get the password? > > FYI that is NOT one of my passwords! > > Jon > On Wed, Aug 10, 2011 at 6:10 PM, Webster <[email protected] > wrote: > Because the security team and or auditor are simply following a check list. > Complex passwords required - check. My job is done. > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ < > http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> > ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ < > http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> > ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ < > http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> > ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ < > http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> > ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ < > http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> > ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ < > http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> > ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ < > http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> > ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ < > http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> > ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ < > http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ > <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> > ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin > Content-Type: image/gif; > name="image001.gif" > Content-Description: image001.gif > Content-Disposition: inline; > Content-ID: <[email protected]> > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ > <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ > <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ > <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin > > ________________________________ > CONFIDENTIALITY NOTICE: This e-mail and any attachments are confidential. > If you are not the intended recipient, you do not have permission to > disclose, copy, distribute, or open any attachments. If you have received > this e-mail in error, please notify us immediately by returning it to the > sender and delete this copy from your system. > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ > <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
