Pertinent to this discussion:
http://www.wired.com/gadgetlab/2012/11/ff-mat-honan-password-hacker/all/
On Wed, Dec 5, 2012 at 8:48 PM, GaryT wrote:
> On 06/12/12 03:53, Ted Roche wrote:
>
>> On Wed, Dec 5, 2012 at 9:42 AM, GaryT wrote:
>>
>>> There isn't a recognizable word in it. Certainly n
On 06/12/12 03:53, Ted Roche wrote:
On Wed, Dec 5, 2012 at 9:42 AM, GaryT wrote:
There isn't a recognizable word in it. Certainly not one you'd find in a
dictionary. And, notice, no punctuation to give away any hints.
There's no one trying to guess your password to see there is punctuation
On Dec 5, 2012, at 2:18 PM, M Jarvis wrote:
> I'm not sure I understand the logic behind doing this... assuming it
> hasn't already been hacked, and assuming I have a 'good' password to
> begin with, if I change it to another 'good' password, isn't it just
> as likely to be hacked as the original
About 2-1/2 hrs ago I posted a message for this thread but it hasn't
shown up. I suspect it's held up at the border crossing. Normal
delivery / turnaround is less than 30 seconds. I think this one will sit
in a queue until vetted by a human.
Proof will be shown when this message is delivered
On 05/12/12 06:24, Ken Kixmoeller (ProFox) wrote:
"abcdefghijklmnopqrstuvwxyz" = 48 quintillion years??? So long and obvious
is better?
[snip]
Obvious cannot be better, certainly not in a case where a human could be
watching the results of a crack unfolding on the screen. But, long is
very
Yeah, this is just a simplistic app that calculates the brute force time to
guess a password depending on the complexity of the range of characters you
use and then number of them. And makes a conservative (very low) guess as
to how fast passwords can be guessed.
The reality is that most passwords
Real Software has a blog posting from yesterday about (better) password
practices:
http://www.realsoftwareblog.com/2012/12/10-tips-to-improve-password-security.html
As Ted Roche says: "Security is a process."
On 12/04/2012 02:33 PM, Stephen Russell wrote:
It would take a desktop PC about6 milli
"abcdefghijklmnopqrstuvwxyz" = 48 quintillion years??? So long and obvious
is better?
On Tue, Dec 4, 2012 at 1:21 PM, Ken Kixmoeller (ProFox) <
foxh...@information-architecture.com> wrote:
> "thisismypassword" = 345,000 years
>
>
> On Tue, Dec 4, 2012 at 12:32 PM, Ed Leafe wrote:
>
>> On De
"thisismypassword" = 345,000 years
On Tue, Dec 4, 2012 at 12:32 PM, Ed Leafe wrote:
> On Dec 4, 2012, at 11:18 AM, Stephen Russell
> wrote:
>
> > http://howsecureismypassword.net/
> >
> > uri says it all.
>
> Not quite. "my password" will take 12 years to crack?
>
>
> -- Ed Leafe
>
On Dec 4, 2012, at 11:18 AM, Stephen Russell wrote:
> http://howsecureismypassword.net/
>
> uri says it all.
Not quite. "my password" will take 12 years to crack?
-- Ed Leafe
___
Post Messages to: ProFox@leafe.com
Subscription Maintenan
Just because you are paranoid doesn't mean that they aren't out there to get
you.
I'd look at a least of common or insecure lists of passwords but no shot I'm
entering any of mine on a site that I know nothing about.
Michael Oke, II
661-349-6221
Contents of this and all messages are intende
Almost. I always thought sites like this were *really* created to encourage
folks that are very proud of their clever passwords to contribute them for
subsequent insertion into the Giant Evil Hacker
List of Passwords. ;-) But maybe I'm just paranoid...
--
rk
-Original Message-
From: P
12 matches
Mail list logo