Hi!
My only comment is that i am not a mathematics so that would be to complicated
for me.
I am more like an philosofic linguist and have lots of strange words sometimes
popping up in my head.
I guess i rather use a password generator or password manager.
/A
> 5 feb. 2017 kl. 04:19 skrev Eric
Hi!
And my memory is kind of full of other things i have to remember so i have to
write the passwords down.
Sadly but i don’t want to be paranoid either.
/A
> 4 feb. 2017 kl. 09:55 skrev Kyle :
>
> I still think the most secure password is the one you don't have to store
>
Linux for blind general discussion <blinux-list@redhat.com>
To: Linux for blind general discussion <blinux-list@redhat.com>
Subject: Re: frustrate shouldservers
well, so far, I have managed to keep track of all of mine. However, some sites I go to won't
let me use any of the more inte
heheh. well, it does help to have an Idetic memory (near total recall). btw,
here is a site I just dug up to test the strength of this password string:
http://www.passwordmeter.com
according to that, I have managed to create a 100% strong password with a
complexity rating of very strong
On 2017-02-04 20:19, Eric Oyen wrote:
> the third part is the date I joined (in MM/DD/:HH:MM:SS
> format).
[snip]
> so, thoughts?
If you can remember when you joined down to the HH:MM:SS, that's
mindblowing. I'd be hard-pressed to be recall the *year* I signed up
for any such sites without
On February 4, 2017, Eric Oyen wrote:
> btw, I use a fairly simple password scheme thats easy for me to
> remember and nearly impossible for anyone to guess it. it's how I
> managed to keep over 200 passwords in my head.
I used to use the site's name inserted into my password
prefix/suffix, so
o...@icloud.com>
Cc: Linux for blind general discussion <blinux-list@redhat.com>
Subject: Re: frustrate shouldservers
On February 4, 2017, Eric Oyen wrote:
THis may be a bit extravagant when it comes to keeping your
passwords safe and usable by you, but it certainly would frustrate
someon
On February 4, 2017, Eric Oyen wrote:
> THis may be a bit extravagant when it comes to keeping your
> passwords safe and usable by you, but it certainly would frustrate
> someone seeking to breach your machine with physical access.
I strongly recommend using a password manager that allows you to
<eric.o...@icloud.com>
Reply-To: Linux for blind general discussion <blinux-list@redhat.com>
To: Linux for blind general discussion <blinux-list@redhat.com>
Subject: Re: frustrate shouldservers
oh yes, there are quite a few books on this subject. Some of them even go into
th
Eric Oyen <eric.o...@icloud.com>
>> Reply-To: Linux for blind general discussion <blinux-list@redhat.com>
>> To: Linux for blind general discussion <blinux-list@redhat.com>
>> Subject: Re: frustrate shouldservers
>> well,
>> just for shits and grins (pa
dhat.com>
To: Linux for blind general discussion <blinux-list@redhat.com>
Subject: Re: frustrate shouldservers
well,
just for shits and grins (pardon my language folks), w
On Feb 4, 2017, at 5:01 AM, Jude DaShiell wrote:
It should be interesting to see if google now has a page availab
here is the cleaned up version folks. looks like my old macbook is developing
some quirks.
***
well,
just for shits and grins (pardon my language folks), while I was up at the
colorado center for the blind, I proposed an idea of encrypted braille. the
idea was so nasty that the braille
t; Date: Sat, 4 Feb 2017 06:47:19
>> From: Kyle <kyle4je...@gmail.com>
>> Reply-To: Linux for blind general discussion <blinux-list@redhat.com>
>> To: blinux-list@redhat.com
>> Subject: Re: frustrate shouldservers
>> Sadly, Google is the password cracker's bes
;
To: blinux-list@redhat.com
Subject: Re: frustrate shouldservers
Sadly, Google is the password cracker's best friend. It can teach the person
who steals that card with the braille password on it all he or she needs to
know about how to read it. Other ways of writing down the password may be
use
Sadly, Google is the password cracker's best friend. It can teach the person who
steals that card with the braille password on it all he or she needs to know
about how to read it. Other ways of writing down the password may be used,
including mnemonics, but if a mnemonic is written well enough
Linux for blind general discussion <blinux-list@redhat.com>
To: Linux for blind general discussion <blinux-list@redhat.com>
Subject: Re: frustrate shouldservers
I still think the most secure password is the one you don't have to store
anywhere other than in your brain. Any stored pass
I still think the most secure password is the one you don't have to store
anywhere other than in your brain. Any stored password, even the one on paper,
can be stolen and compromised. However, I don't think anyone has yet found a way
to steal passwords by reading thoughts. That said, any
On February 3, 2017, Eric Oyen wrote:
> hmmm. I wonder if that python script will work on my OS X lion
> macbook here. could make for an interesting test.
>
> > https://gist.github.com/Gumnos/fceaf405b0ffd8bfd325
Yes! It should work with both Python 2 and Python 3. I tested it
and it should
hmmm. I wonder if that python script will work on my OS X lion macbook here.
could make for an interesting test.
-eric
from the central office of the Technomage Guild
On Feb 3, 2017, at 1:39 PM, Tim Chase wrote:
> If you want a password generator that can produce fairly strong
> "XKCD"
oh yeah. you would need a Bot net for that. Then again, guessing at over 2
quadrillion password combinations (50 characters) will still take a rather long
time.
-eric
from the central office of the Technomage Guild
On Feb 3, 2017, at 10:35 AM, Janina Sajka wrote:
> Sure, but how long to try
here is another one for you. there is another utility called "jive". take your
original passphrase, run it through that and then use that to generate a hash.
good luck guessing that one. :)
-eric
from the central office of the Technomage Guild
On Feb 3, 2017, at 10:25 AM, Janina Sajka wrote:
If you want a password generator that can produce fairly strong
"XKCD" passwords, I created one a while back
https://gist.github.com/Gumnos/fceaf405b0ffd8bfd325
It's a single Python file that lets you choose how many words you
want, the min/max length of those words, how many passwords to
t@redhat.com
Subject: Re: frustrate shouldservers
Sure, but how long to try each of those against any particular address?
When I was still open over IPv4, you'd be blocked by denyhosts after
just a handful of tries, unless you also managed to attack from
different IP addresses. Hardly anyone i
Sure, but how long to try each of those against any particular address?
When I was still open over IPv4, you'd be blocked by denyhosts after
just a handful of tries, unless you also managed to attack from
different IP addresses. Hardly anyone is able to do that over a /24, let
alone a /16 or /8.
This has been a very good thread.
I have one additional suggestion which is to add something you
personally know, but that could not be guessed very easily, nor exposed
by a dictionary attack.
I find alternative, non standard phonetic spellings helpful this way.
Even better are obscure, obsolete
well,
you could also use a little linux utility called "pwgen". It can generate short
or very long sequences of characters for passwords (the last time I tried, I
created a rainbow dictionary from password strings that started at 3 characters
and ended somewhere around 50 long. The dictionary I
password cracking that way.
On Thu, 2 Feb 2017, Tim Chase wrote:
Date: Thu, 2 Feb 2017 12:35:11
From: Tim Chase <t...@thechases.com>
To: Jude DaShiell <jdash...@panix.com>
Cc: blinux-list@redhat.com
Subject: Re: frustrate shouldservers
I've used a technique that's come to be known
When using a password generator it can help to pick a password from a list
shown but not key it in or store it in the same way it appears on the
screen. Several scrambling possibilities exist probably only limited by
the imaginations of those picking the new passwords. It's just a matter
of
28 matches
Mail list logo