Re: frustrate shouldservers

2017-02-06 Thread Anders Holmberg
Hi! My only comment is that i am not a mathematics so that would be to complicated for me. I am more like an philosofic linguist and have lots of strange words sometimes popping up in my head. I guess i rather use a password generator or password manager. /A > 5 feb. 2017 kl. 04:19 skrev Eric

Re: frustrate shouldservers

2017-02-05 Thread Anders Holmberg
Hi! And my memory is kind of full of other things i have to remember so i have to write the passwords down. Sadly but i don’t want to be paranoid either. /A > 4 feb. 2017 kl. 09:55 skrev Kyle : > > I still think the most secure password is the one you don't have to store >

Re: frustrate shouldservers

2017-02-05 Thread Jude DaShiell
Linux for blind general discussion <blinux-list@redhat.com> To: Linux for blind general discussion <blinux-list@redhat.com> Subject: Re: frustrate shouldservers well, so far, I have managed to keep track of all of mine. However, some sites I go to won't let me use any of the more inte

Re: frustrate shouldservers

2017-02-04 Thread Eric Oyen
heheh. well, it does help to have an Idetic memory (near total recall). btw, here is a site I just dug up to test the strength of this password string: http://www.passwordmeter.com according to that, I have managed to create a 100% strong password with a complexity rating of very strong

Re: frustrate shouldservers

2017-02-04 Thread Tim Chase
On 2017-02-04 20:19, Eric Oyen wrote: > the third part is the date I joined (in MM/DD/:HH:MM:SS > format). [snip] > so, thoughts? If you can remember when you joined down to the HH:MM:SS, that's mindblowing. I'd be hard-pressed to be recall the *year* I signed up for any such sites without

Re: frustrate shouldservers

2017-02-04 Thread Tim Chase
On February 4, 2017, Eric Oyen wrote: > btw, I use a fairly simple password scheme thats easy for me to > remember and nearly impossible for anyone to guess it. it's how I > managed to keep over 200 passwords in my head. I used to use the site's name inserted into my password prefix/suffix, so

Re: frustrate shouldservers

2017-02-04 Thread Jude DaShiell
o...@icloud.com> Cc: Linux for blind general discussion <blinux-list@redhat.com> Subject: Re: frustrate shouldservers On February 4, 2017, Eric Oyen wrote: THis may be a bit extravagant when it comes to keeping your passwords safe and usable by you, but it certainly would frustrate someon

Re: frustrate shouldservers

2017-02-04 Thread Tim Chase
On February 4, 2017, Eric Oyen wrote: > THis may be a bit extravagant when it comes to keeping your > passwords safe and usable by you, but it certainly would frustrate > someone seeking to breach your machine with physical access. I strongly recommend using a password manager that allows you to

Re: frustrate shouldservers

2017-02-04 Thread Jude DaShiell
<eric.o...@icloud.com> Reply-To: Linux for blind general discussion <blinux-list@redhat.com> To: Linux for blind general discussion <blinux-list@redhat.com> Subject: Re: frustrate shouldservers oh yes, there are quite a few books on this subject. Some of them even go into th

Re: frustrate shouldservers

2017-02-04 Thread Eric Oyen
Eric Oyen <eric.o...@icloud.com> >> Reply-To: Linux for blind general discussion <blinux-list@redhat.com> >> To: Linux for blind general discussion <blinux-list@redhat.com> >> Subject: Re: frustrate shouldservers >> well, >> just for shits and grins (pa

Re: frustrate shouldservers

2017-02-04 Thread Jude DaShiell
dhat.com> To: Linux for blind general discussion <blinux-list@redhat.com> Subject: Re: frustrate shouldservers well, just for shits and grins (pardon my language folks), w On Feb 4, 2017, at 5:01 AM, Jude DaShiell wrote: It should be interesting to see if google now has a page availab

Re: frustrate shouldservers

2017-02-04 Thread Eric Oyen
here is the cleaned up version folks. looks like my old macbook is developing some quirks. *** well, just for shits and grins (pardon my language folks), while I was up at the colorado center for the blind, I proposed an idea of encrypted braille. the idea was so nasty that the braille

Re: frustrate shouldservers

2017-02-04 Thread Eric Oyen
t; Date: Sat, 4 Feb 2017 06:47:19 >> From: Kyle <kyle4je...@gmail.com> >> Reply-To: Linux for blind general discussion <blinux-list@redhat.com> >> To: blinux-list@redhat.com >> Subject: Re: frustrate shouldservers >> Sadly, Google is the password cracker's bes

Re: frustrate shouldservers

2017-02-04 Thread Jude DaShiell
; To: blinux-list@redhat.com Subject: Re: frustrate shouldservers Sadly, Google is the password cracker's best friend. It can teach the person who steals that card with the braille password on it all he or she needs to know about how to read it. Other ways of writing down the password may be use

Re: frustrate shouldservers

2017-02-04 Thread Kyle
Sadly, Google is the password cracker's best friend. It can teach the person who steals that card with the braille password on it all he or she needs to know about how to read it. Other ways of writing down the password may be used, including mnemonics, but if a mnemonic is written well enough

Re: frustrate shouldservers

2017-02-04 Thread Jude DaShiell
Linux for blind general discussion <blinux-list@redhat.com> To: Linux for blind general discussion <blinux-list@redhat.com> Subject: Re: frustrate shouldservers I still think the most secure password is the one you don't have to store anywhere other than in your brain. Any stored pass

Re: frustrate shouldservers

2017-02-04 Thread Kyle
I still think the most secure password is the one you don't have to store anywhere other than in your brain. Any stored password, even the one on paper, can be stolen and compromised. However, I don't think anyone has yet found a way to steal passwords by reading thoughts. That said, any

Re: frustrate shouldservers

2017-02-03 Thread Tim Chase
On February 3, 2017, Eric Oyen wrote: > hmmm. I wonder if that python script will work on my OS X lion > macbook here. could make for an interesting test. > > > https://gist.github.com/Gumnos/fceaf405b0ffd8bfd325 Yes! It should work with both Python 2 and Python 3. I tested it and it should

Re: frustrate shouldservers

2017-02-03 Thread Eric Oyen
hmmm. I wonder if that python script will work on my OS X lion macbook here. could make for an interesting test. -eric from the central office of the Technomage Guild On Feb 3, 2017, at 1:39 PM, Tim Chase wrote: > If you want a password generator that can produce fairly strong > "XKCD"

Re: frustrate shouldservers

2017-02-03 Thread Eric Oyen
oh yeah. you would need a Bot net for that. Then again, guessing at over 2 quadrillion password combinations (50 characters) will still take a rather long time. -eric from the central office of the Technomage Guild On Feb 3, 2017, at 10:35 AM, Janina Sajka wrote: > Sure, but how long to try

Re: frustrate shouldservers

2017-02-03 Thread Eric Oyen
here is another one for you. there is another utility called "jive". take your original passphrase, run it through that and then use that to generate a hash. good luck guessing that one. :) -eric from the central office of the Technomage Guild On Feb 3, 2017, at 10:25 AM, Janina Sajka wrote:

Re: frustrate shouldservers

2017-02-03 Thread Tim Chase
If you want a password generator that can produce fairly strong "XKCD" passwords, I created one a while back https://gist.github.com/Gumnos/fceaf405b0ffd8bfd325 It's a single Python file that lets you choose how many words you want, the min/max length of those words, how many passwords to

Re: frustrate shouldservers

2017-02-03 Thread Jude DaShiell
t@redhat.com Subject: Re: frustrate shouldservers Sure, but how long to try each of those against any particular address? When I was still open over IPv4, you'd be blocked by denyhosts after just a handful of tries, unless you also managed to attack from different IP addresses. Hardly anyone i

Re: frustrate shouldservers

2017-02-03 Thread Janina Sajka
Sure, but how long to try each of those against any particular address? When I was still open over IPv4, you'd be blocked by denyhosts after just a handful of tries, unless you also managed to attack from different IP addresses. Hardly anyone is able to do that over a /24, let alone a /16 or /8.

Re: frustrate shouldservers

2017-02-03 Thread Janina Sajka
This has been a very good thread. I have one additional suggestion which is to add something you personally know, but that could not be guessed very easily, nor exposed by a dictionary attack. I find alternative, non standard phonetic spellings helpful this way. Even better are obscure, obsolete

Re: frustrate shouldservers

2017-02-02 Thread Eric Oyen
well, you could also use a little linux utility called "pwgen". It can generate short or very long sequences of characters for passwords (the last time I tried, I created a rainbow dictionary from password strings that started at 3 characters and ended somewhere around 50 long. The dictionary I

Re: frustrate shouldservers

2017-02-02 Thread Jude DaShiell
password cracking that way. On Thu, 2 Feb 2017, Tim Chase wrote: Date: Thu, 2 Feb 2017 12:35:11 From: Tim Chase <t...@thechases.com> To: Jude DaShiell <jdash...@panix.com> Cc: blinux-list@redhat.com Subject: Re: frustrate shouldservers I've used a technique that's come to be known

frustrate shouldservers

2017-02-02 Thread Jude DaShiell
When using a password generator it can help to pick a password from a list shown but not key it in or store it in the same way it appears on the screen. Several scrambling possibilities exist probably only limited by the imaginations of those picking the new passwords. It's just a matter of