Much has been said on the theory of password protection for files, computer login, and other network access. In the past we used a combination of letters, special characters, and other techniques to try and prevent unwanted or unauthorized access to our computers, resources, and networks. A new theory on passwords is emerging that may help us remember our access codes, be more secure, and generally keep hackers and thieves out of our networks.
A password is a combination of words, letters, and special characters that only the user knows, allowing access to a computer or other information resources. As humans we have a large number of codes and numbers we need to remember every day ? such as the key lock on our apartment entries, national identification numbers, automobile license or tag numbers, telephone numbers ? it is a large and confusing suite of items we need to memorize.
When selecting a new password or pass code for access to a computer system, most of us understand how difficult it is to remember complex codes, and thus we select something already know n to us, such as names, birthdays, national identifiers, or other known items, and then place a number or character in front of the name or number thinking it is secure. This is easy to understand, as most of us simply do not have an ability to instantly recall large numbers of complex codes.
In a worst case we simply write down the complex code on a piece of paper, and leave it in a desk, our pocketbook, or in many cases taped to the front of our computer monitor.
However, to a hacker this makes access to your network or computer much easier, at they generally only have to learn a couple things about you, and add a few numbers to the front or ending of your personal data ? you would be surprised how often this grants access to computers and networks. Ad some good "cracking utilities" to the hacker's suite of tools, and you can understand the threat.
PassPhrases are a concept that will help us create more secure, easy to remember safeguards for our computer and network resource protection. A passphrase is a selection of words and/or numbers that are 15 characters or more in length, and are easy for us to remember. A couple examples of a good pass phrases are:
? igotodalaieejdaily
? shehasbeautifulhair
? surfinginhawaiiisgreat
According to Mark Minasi, a noted security consultant, a 15 character pass phrase will require a cracking program the following number of computations to try and break a 15 character pass phrase:
? 15 lowercase letters = 1,677,259,342,285,725,925,376 possibilities
? Try a million a second, it'll take 531,855 centuries/years to break the code
As you can see, this is a pretty good level of security for your resource.
Another concern with passwords is if you forget or lose the password, and are using a utility like Microsoft's Encrypting File System (EFS), you run the risk of losing all access to your important files if you require a hardware reset of your password. All EFS encrypted files are linked to your login profile, meaning if you encrypt a directory or file with EFS, and you do a hardware reset on your computer, those files and directories are lost FOREVER.
For Microsoft Windows users you can now also use spaces within your pass phrase, however we would not recommend embedding spaces in your pass phrase, as that actually does allow a cracker better access to getting your code ? it may help them crack it in 100,000 years rather than 250,000!
(About the Author ? John Savageau is a managing director at CRG-West, responsible for managing operations and architecture for several of the largest telecommunications interconnect facilities in the US, including One Wilshire in Los Angeles)
It has been said that with the wealth of information,... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Shopping for horse gifts or other gift items on the... Read More
Sooner or later everyone with an email account will receive... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
Computer infections can be broken up into 4 main categories... Read More
The first thing people think about when defending their computers... Read More
The average computer is packed with hidden software that can... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Whether we like it or not, we are all living... Read More
Nowadays more and more people are using a computer. A... Read More
Having a good Spyware eliminator on your computer is vital... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
If spyware were a person and he set himself up... Read More
History and BackgroundThe virus was one of the first ever... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
Can you protect your computer from all possible viruses and... Read More
P C. owners are constantly at risk from attacks by... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
If you are a parent, you have probably wondered at... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Every now and then you can read about a new... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
When it comes to a secure website and passwords it... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
Have you ever got an email asking you to confirm... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
A couple of days ago, I was searching for a... Read More
Someone recently told me, "You would have to be a... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
Well, this is an article I never thought I would... Read More
A friend called me one day and asked if I... Read More
Ebay is a great site and is used by many... Read More
When we think of adware, what comes to mind are... Read More
First off I should explain what phishing is. Phishing is... Read More
Can you protect your computer from all possible viruses and... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
When surfing the Internet you probably take your anonymity for... Read More
Shopping for horse gifts or other gift items on the... Read More
Fishing on the Internet has come a long way. However,... Read More
The first thing people think about when defending their computers... Read More
You are at your computer, checking out software on EBay.... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
If spyware were a person and he set himself up... Read More
In 1997, I decided after 15 years as a practicing... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
P C. owners are constantly at risk from attacks by... Read More
These six ways to prevent identity theft offer you valuable... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Huge number of spyware software applications are available in the... Read More
There is nothing more important that password security in world... Read More
You may not realize it, but as you are surfing... Read More
If you are a parent, as am I, I think... Read More
Spyware is software or hardware installed on a computer without... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
First I would like to stress I am condoning the... Read More
Millions of people make purchases online, but many people are... Read More
Internet Security |