Blog Archive
-
▼
2012
(355)
-
▼
October
(59)
- Review: Intel's Series 335 delivers more SSD for l...
- Nokia Lumia 820 up for UK pre-order: free on contr...
- Faulkner Estate Sues Sony Pictures Because Owen Wi...
- Surface RT hands on
- Frankenstorm: New Yorkers hunker down with artisan...
- Social TV and second-screen viewing: the stats in ...
- Hurricane Sandy playlist: 10 songs to get you thro...
- How to Tell if Your Home Has Code Violations
- Random House Says Libraries Own Their Ebooks, Really
- Virgin Media adds 60,000 internet subscribers in t...
- How to Make a Jack O' Lantern from an Empty Toilet...
- Visualized: Space shuttle Endeavour goes on a cros...
- GoPro's new Hero3 is lighter, faster, higher res a...
- How to Use Windows 8
- Review: Dark Souls brings murderously hard gamepla...
- First Look at Miley Cyrus on "Two and a Half Men" ...
- Madonna Attacked for Dedicating Inappropriate Danc...
- Make sense of the presidential debates with #smart...
- Halloween fonts that aren't afraid to say "Boo!"
- Comcast quietly updates DVRs with ability to list ...
- Matthew Woods deserves support as much as airport ...
- Here's The Upcoming Nexus Superphone Made By LG
- Chevron Subpoenas Google, Yahoo & Microsoft To Get...
- My son Gary McKinnon has won justice at last | Jan...
- Call of Duty Elite to be free for Black Ops 2
- Will algae ever power our cars?
- Angry Birds games have 200m monthly active players
- The Canyons trailer: has it lost the plot?
- Trick or Treat: Deck the haunts with Halloween din...
- Virginia Beach McDonald's adds free iPad use to it...
- Twitter fiction: 21 authors try their hand at 140-...
- MooresCloud Light runs Linux, puts LAMP on your la...
- Review: Fifth-generation iPod touch is faster, fin...
- Toshiba Satellite R945-P440 review: Sturdy and so-so
- Exposing Reddit's purveyors of 'creep shots'
- SoundExchange, Once Again, Warns Artists That If T...
- Kimera Systems wants your smartphone to think for you
- Congress: Fear Chinese Networking Companies! But I...
- Human Rights Group Deploys An 'Empathy Test' Captc...
- Sky+ or YouView - which is best?
- LG Nexus 4 Spotted at The Carphone Warehouse in Bl...
- 3D printers shape up to lead the next technology g...
- Rightwingers seek tweet revenge with claims of une...
- AT&T launches VoteHub, brings the presidential ele...
- BBC launches iPlayer Radio: a separate radio-only ...
- White House turns back "spear phishing" attack on ...
- Even Apple Doesn't Use Its Own Maps
- Halo 4: the film of the game
- Touch Bionics releases new prosthetic fingers, fli...
- Women at work: 'Forget the balance. This is the me...
- Dell Inspiron 15R 5520 review: Solidly budget-frie...
- Creepy Smartphone Malware Re-creates Your Home For...
- Online passwords: keep it complicated
- Sony starts delivering Ice Cream Sandwich update t...
- DRAM Patent Holder Rambus Called Out (Again) For S...
- Dell Inspiron 17R-1316MRB Review: A Budget Desktop...
- Lockitron launches iPhone-controlled keyless lock ...
- Amazon launches organic, eco-friendly site Vine.com
- Penguin Taking Underperforming Authors To Court To...
-
▼
October
(59)
About Me
Online passwords: keep it complicated
By now you probably have about 20 different passwords you have trouble remembering. There must be an easier way. How can you keep a step ahead of hackers - and stay sane
Let me venture a guess: the system password using the Internet - to access online banking, e-mail, commercial sites, Twitter and Facebook accounts - is a disaster. You know what
duty
do: for every site you visit, you must choose a different sequence and complex letters, numbers and symbols, and then memorize it. (This is the number one rule of the conventional wisdom about passwords never, ever write.) But you do not, because they were not blessed with a brain that is capable of such prowess. Thus, instead of using the same words familiar to all sites - the name of his dog, the name of the street - sometimes with permutations of mind, and add "123" to the end. Or maybe try to follow the rules, in this case, you're probably always be excluded from your bank account or try to remember the answers to several security absurd. ("What was your favorite sport as a child?" Now, I wonder, but my real favorite sport was a way to dodge PE. Question in the iTunes store requires users to designate their "least favorite car.") And it gets worse: these days, you are forced to choose passwords with upper and lower case, and that a normal human being can remember multiple combinations of these? Not you, that's for sure.
One reason not to feel too guilty about their behavior is wrong password seems to be almost universal. Last month, an analysis of pin numbers filtered revealed that about one in 10 of us use "1234", a security flaw in Yahoo recently revealed that thousands of user passwords are "password "," welcome "," 123456 "or" ninja ". People choose passwords terrible even when there is more at stake than your savings: specialists in military security, it is well known that at the height of the Cold War, the "secret unlock code" for missiles U.S. nuclear was 00000000. Five years ago, the BBC revealed that, until 1997, a British nuclear missiles were armed by turning a key in what was essentially a lock. To decide whether the bomb to explode in the air or on the ground, turned with an Allen wrench brand Ikea style. No access codes at all. Speed ??of retaliation if attacked by the enemy, after all.
The sad state of our passwords is the result of the arms race between different hackers and "white" hat safety testers. But when it comes to some of the most deeply involved, it quickly becomes apparent that the conventional wisdom is wrong. For example: write your passwords can be a great plan. Employers who insist on change password security personnel every 90 days are not likely to increase and may make things worse. The same goes for some of the rules of password of your bank insists on going - no more than 12 characters, no spaces, etc.. In the background of all this is the truth passwords as a method to keep our private data securely over the Internet are fundamentally broken. When I asked the veteran security researcher Bill Cheswick if there was a way to solve the problem once and for all, I've been thinking, and then suggested ". Burn your computer and go to the beach "But although the system may be in chaos, there are things you can do to stay safe and healthy. I do not necessarily agree with the things you 've said.
Passwordpiracy takes many different forms, but one important thing to understand is that there is often a matter of diabolical cunning, exclusivity and brute force. For example, a hacker who sneaks into the company's servers and stole a file containing a few million passwords. These will (hopefully) have been encrypted, so you can not log in to your account if your password is "hello" - which of course should not be - it may be saved in the file as something like "$ 1 $ r6T8SUB9 Qxe41FJyF/3gkPIuvKOQ90." We simply can decipher the gibberish providing "a form of encryption" was used. What you can do, however, is to feed millions to guess your password in the same encryption algorithm until one of them - bingo! - The results of a corresponding string of gibberish. So you know you are getting a password. (An additional encryption technique called "salty", makes this type of attack impossible, but it is not known how many companies actually use it.)
This is the password length is an incredible difference. For a hacker with the computing power to make conjectures 1,000 per second, one of the five letters, purely by chance, any password in lowercase, as "fpqzy" take three and three quarters of an hour to crack. increase the number of characters to 20, however, cracks and increases the time, just a bit:. centuries is 6500000000000000
Then there is the issue of predictability. Nobody thinks that passwords combining truly random sequence of letters and numbers, but follow the rules, like using actual words and replacing the letter O with a zero, or the use of names followed by one year. Hackers know, so that their software can integrate these rules to generate conjectures, which significantly reduces the time it takes to find a good one. And whenever there is a new leak of millions of passwords - as it happened in 2010 and Gawker LinkedIn and Yahoo this year - which effectively adds to a large body of knowledge on how people create passwords, which makes things even easier. If you think you have to give an intelligent system passwords, it is likely that hackers are already familiar with it.
Password hackedyes, then it would be a long chain of completely random letters, numbers, spaces and symbols - but can not remember. However, due to the length matter much, really surprising is that a long enough string of random English words, all lowercase - for example, "bird woke cane wheels" - it is actually much safer that a short password that follows the rules of your bank annoying, as "M @ nch3st3r." And easier to remember: you have already made a memorable image of some noisy awakening fishing ostrich wheels along the river, right? As the popular xkcd cartoon connoisseur put last year, what exactly makes this "Through 20 years of efforts, we have successfully trained everyone to use passwords that are difficult for humans to remember, but easy for teams to guess. "
- Some websites allow you to use a phrase like fishing ostrich. But many will not - and in these cases, security experts agree, the cause of your bank and write. His logic is simple: when you know that you can not commit anything on paper, make it simple, if you end up choosing weak passwords. (The same applies to boards - sometimes a requirement - to change your password regularly:. More passwords to remember, more pressure to choose the easy) "I have 68 different passwords," one security expert Jesper Johansson named Microsoft said at a conference a few years ago. 'If I am not allowed to write any of them down, guess what I do, I will use the same password for all of them. " Cryptographer Bruce Schneier, another defender type passwords, notes that most of us are very good at maintaining the safety of small pieces of paper. If you can trust your spouse or roommates, is the type of computing security has the ability to do so. Your bank account could be at risk of a group of Russian hackers really not.
both sides are right. This is the problem of security: it is always a question of compensation. More comfort means less security, more protection against ranged attacks means less protection against a roommate elusive. Would you rather run a little higher (but difficult to quantify) the risk of losing your money, or condemn to years of discomfort password? This is a question almost as surprising as, "What is your favorite car at least?"
Bill Cheswick - "Ches" to his friends - is far from alone in believing that we as a society descend into chaos happening. What makes it unique is that it is ready to accept the responsibility of being part of the blame. In 1994, as a member of the Research Division of the fable AT & T, Bell Labs, who co-authored a book with the evocative title firewall and Internet security: The Wily Hacker repellent. (He also coined the term "proxy server", several things it does in Internet environments, a minor deity.) This book helped lay the foundations for the modern online security. But now, he says, when we meet in a coffee bar in Manhattan, passwords have become "a pain in the ass, that can keep track of all these things?" This is a subject on which Cheswick a man voluble enthusiasm in most of the time anyway, comes alive as people from other tables start to look up from their laptops. "And all these rules! You should mix symbols, numbers of cases, ... "
Find best price for : --LastPass----Link----Neil----Cheswick----Bill--
0 comments:
Post a Comment