Until now, this concept has been the realm of science fiction and spy movies.
Off-hand, I can't think of any reason not to do it either. I would love to see it implemented in modern OSes, and critical business apps. * * *ASB* *http://about.me/Andrew.S.Baker* *Harnessing the Advantages of Technology for the SMB market… * On Thu, Aug 18, 2011 at 1:25 PM, Hilderbrand, Doug < [email protected]> wrote: > I was just reading all those emails about making hard to crack passwords > (Almost but not quite OT: Passwords). I like Steve Gibson’s analysis of why > long passwords are harder to brute force crack than shorter complex ones. > But, I wonder…**** > > ** ** > > Why hasn’t anyone implemented fail words? Two or more passwords associated > with your account or whatever. One you use for normal access and is as hard > to crack as you can make it and still be memorable. Then another password > that would be easy(er) to crack that triggers some event? Here are a few > scenarios I can think of off the top of my head:**** > > ** ** > > [] Bank manager forced to open the vault at gunpoint. Use the failword. > Opens the vault and rings the silent alarm.**** > > [] Someone tries to login to your PayPal or bank account and tries your > failword. They get the usual bad password result, but you get a text message > on your cell phone.**** > > [] Someone tries to unlock your iPhone. They try the failword and it gets > locked until you send it a special email or text or 24 hours expire, etc. > **** > > ** ** > > Is there some reason this is a bad idea? I can’t think of any…**** > > ** ** > > Doug Hilderbrand | Systems Analyst, Information Technology | Crane > Aerospace & Electronics > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
